Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 17:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://celinemorreparis.fr/u2ofp/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://celinemorreparis.fr/u2ofp/
Resource
win10v2004-20231215-en
General
-
Target
https://celinemorreparis.fr/u2ofp/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1200 msedge.exe 1200 msedge.exe 3744 msedge.exe 3744 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3744 wrote to memory of 1824 3744 msedge.exe 56 PID 3744 wrote to memory of 1824 3744 msedge.exe 56 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1996 3744 msedge.exe 87 PID 3744 wrote to memory of 1200 3744 msedge.exe 88 PID 3744 wrote to memory of 1200 3744 msedge.exe 88 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89 PID 3744 wrote to memory of 4720 3744 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://celinemorreparis.fr/u2ofp/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdad4446f8,0x7ffdad444708,0x7ffdad4447182⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6207938473802984403,11306622873188088685,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\164a9255-db8f-4d92-9b2e-2f33acfddad5.tmp
Filesize24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
660B
MD57b06b963af12dd328304939a160db990
SHA1a251e52477ffc2c50b55be14a3a8843eb07488e2
SHA25660cd05edfe3403bd69eb69e82815c7bd8fca91414d9b39e9a0f051e8e99d3019
SHA512202fbad6ad5b4e9a2e6cbd4678b968414378977eb4b32b38b76153485d38f1ad2e776b7df180939347f92fb65657e5505b144a435d36e4a2beaf67431da223b9
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d0a64d6f328dd0f48bdea5de2894e853
SHA14fa455522941560ab8a3f85ae234bbdad642f37c
SHA256a14182c83812faff77f34a350b3f6b01a1d481064ef463b4ed2d9db02f51fd5d
SHA51270f51272ee5a73178ec16238af7a3547de0e5345773ccc1984a1bb11782b9c1067d0eb883ee91b4ad6de4472019cf4b6afa648c26212490791c1488794426c54
-
Filesize
5KB
MD5d9a124a5d74712ffc80ea6ffa4a3a964
SHA121551fcd82e0fb0d8c7d1c8dfc42ce10442ee047
SHA2561aff4c7765a00c11af9f36e10844c6f1bbfc73adba600b1d1cc2a1e1fbad422e
SHA51277ce332c0e16d79c4aeb298c2268e460404dcabe2fbc38d4de1f4c73e8c97df5962dc4555513a7db71fbf1beb6cd9e929ddd9e106467839bf7c7e5bda99265ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c5c29d7f33b37090919fc5d4a02257e1
SHA11acfc438c8910d675c9bae7c1174c46a1b641a4b
SHA256d88bc7a9a8a2b379a7e9adeb6f46432598ce36b52a665356aebe312fe805e224
SHA51239aa2a548be12f51ab4b5a2ef8bc3b9829c3ed3bd80c7761880b68b0a250b80bf5be64993d6f45d8c860fffb9cae49ca2c4d9bb3eba3c76554bed19c27b72553