Analysis
-
max time kernel
103s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 14:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.fdmgroup.com/
Resource
win10v2004-20231215-en
General
-
Target
https://www.fdmgroup.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 628 msedge.exe 628 msedge.exe 908 msedge.exe 908 msedge.exe 4988 identity_helper.exe 4988 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 908 wrote to memory of 3148 908 msedge.exe 86 PID 908 wrote to memory of 3148 908 msedge.exe 86 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 4928 908 msedge.exe 89 PID 908 wrote to memory of 628 908 msedge.exe 88 PID 908 wrote to memory of 628 908 msedge.exe 88 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90 PID 908 wrote to memory of 2352 908 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.fdmgroup.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac9d446f8,0x7ffac9d44708,0x7ffac9d447182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,13193502201640962052,2853487601975979404,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize720B
MD500823ba02a432b991239577a168aaa61
SHA119b8769d6150cdbd37c0b6799360587b8d6cdd9d
SHA25675d6c8658078af3b040f8068999eac7ea5c8b56cdd4b85b2e08508f3da34c782
SHA512c73dc9750e85163e502e62016ebd36e35cda5fcffe5136da7164fcbb18dace3445621f3a00a6b3270f13e1aec81ae411eca40836c01c6c073fed9cea279ed1d0
-
Filesize
3KB
MD55dfa798d1d8a2519dd80463eccc00d04
SHA1e722a69203df4e05535f714f73f36c4ee199b4c2
SHA256d07035d4cf6cefc5563890cb1151ccaf9e648400128380da179ff9ac2ef38aa6
SHA5122e0bb47fb0461c0135f9cc6af2a154f76412e0b54437a90cff2f0f065293459adca2b97be5932ed9fa9d5afb72436adcaacf6bdaec8352fdd5f62922684713af
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
7KB
MD5b537a43891138326472cd04267007d54
SHA16215fe23741017381990cc03bb95dff08d1b1275
SHA2565f3e3642c1366dd39de521ed25a46e372a6e22d8c84ecd1c8b150982085dec87
SHA51270d81d5b56812e8cafa93dc825fa58f486a72ee38962b2553481eb586d751889fcb98d74c7fbe9f5b11688ecaf1bbecf1fdacad5d4d09bb7a2c000abe73c4e63
-
Filesize
5KB
MD5e035d5a355db960465e9ce7641c0e8b2
SHA11a233cf1a08c688f041855883797ab3fa44e3fcf
SHA256025795bd0b7cb18b51bf1c80f878da560cd7d711c2d38632f586968521f38505
SHA5126ca78b2437a2a88a4781a5dc3b9dc24f537ac312b38f6d93d15fdef464c6ab8bc666c5274266eaeea43eabe302bef8d9a19ac252d28eb808895542c2d45059c8
-
Filesize
8KB
MD50d0efe555d3c13324394681c090a7555
SHA1ba1ffd54fc8d885843625ffd00bce5675d3c76c6
SHA25613f9efeb22155074fc854d7c182425bf690c21c33369b2fe535d3d23a888a9f7
SHA51256dcb296edef6a5b3928cef593390e1bf1dddae17a73e02ec5eae87eed20a19be670b29275c6bfbea83a4e6a996d620dc9277cb8b5c29597c3f8613f8c562f51
-
Filesize
24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
2KB
MD5e1ba940bc15a80088f51f9ac114588d3
SHA1ab2b88d509b3d756f3a1b12527d77eb4e363982b
SHA256d3b42f08442e977ae6f75aafb351d6a998bf3095b8a6257c9d67dea9faa144cd
SHA512527a61d4834175ffa105bdec7440a47d9981c76649291724ea6794bd6278d7df3ceb8d58e391145b7f5d2c0b17a4463519e16f92d47fd275a90f3c7f52205e71
-
Filesize
1KB
MD505fcb5803e7a12f1e99272e19bf28db5
SHA1852a508c24acd61405784f8fa023633448517690
SHA256eb4a5e553c58b838b1877f9f05beb86f0dae6354f02dcb3ea5bafd082c8f88d9
SHA5125181eeeda3d21b60aebbd23ff471f268374b715bab123378337159c774f201adba11bf70aef7d45d8a27e795d0ac505eace07be93897635d542fce1ad5a04e68
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5760338dc905a56181fb11e4c71272f08
SHA1bab578ceb3543354c6ea9fda838155dd14b78083
SHA2564f99831d0033de1003231b63d4c63336854f05cc9a99f0677c78116a688d42db
SHA512d3e697051fe7785ff8f08cc2988da1a04e75fcc7e4228483508eb4c44d8b3759fe29621d1b646007a2749c4167c51b27c1a1cdc57bc230ebc4342d977436378d