Analysis
-
max time kernel
160s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 02:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://maconlineau.com/
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
https://maconlineau.com/
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral3
Sample
https://maconlineau.com/
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
https://maconlineau.com/
Resource
android-x64-arm64-20231215-en
General
-
Target
https://maconlineau.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1012 msedge.exe 1012 msedge.exe 4532 identity_helper.exe 4532 identity_helper.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 2996 1012 msedge.exe 84 PID 1012 wrote to memory of 2996 1012 msedge.exe 84 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 4828 1012 msedge.exe 86 PID 1012 wrote to memory of 1864 1012 msedge.exe 85 PID 1012 wrote to memory of 1864 1012 msedge.exe 85 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87 PID 1012 wrote to memory of 3344 1012 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://maconlineau.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e22346f8,0x7ff9e2234708,0x7ff9e22347182⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4717922918957427491,16719076603277634428,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fa070c9c9ab8d902ee4f3342d217275f
SHA1ac69818312a7eba53586295c5b04eefeb5c73903
SHA256245b396ed1accfae337f770d3757c932bc30a8fc8dd133b5cefe82242760c2c7
SHA512df92ca6d405d603ef5f07dbf9516d9e11e1fdc13610bb59e6d4712e55dd661f756c8515fc2c359c1db6b8b126e7f5a15886e643d93c012ef34a11041e02cc0dc
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5c050804a2abef688d0f52468e1af1d20
SHA1134a749570dda340a258822a70c32672495e7967
SHA2564c699d09dd02059b9100c62a629afd133dacaef29549e726035f6e4cbaada8a2
SHA512163d22cb70988cd735fd91612ec8444910c2565d0f391a24592203692415274c76c004dc1d39cda5e4d87ed9c5837938a520901644b7b823a1e61e79426977bd
-
Filesize
5KB
MD510dea526feaf41476b90c19c9d9089c8
SHA1b5e3ccb2ff59e941c8f88867d5e310c909a935b4
SHA256c411c7068d2fff176c9adf5d23df2538b8bc7f47ce97c494bf250c99d59f885b
SHA5123c2f1e351c9f424b2186756aca0e63f79bf50011860562773f0689e2f766b8e5e34e1f9306052e32983577f223e0e5502fb23999fc2bcf97f58a1b00180d277a
-
Filesize
5KB
MD5d4bede4e04835b06bceaa228379ba4c2
SHA1236caccc47af1531a136bb20ff84406ec8b31bad
SHA2565d951ef14f57f359b4f7157302eac0fe264365ae7812be9d25a247f93cedcde8
SHA512c6c29f3962aa189bcf68e4147627402b36a23af0b2467e97215fbddf47bca4d306101959438f8ea743e96ee85a77d4be01909beb8a571550cc0c90fb231bf953
-
Filesize
24KB
MD5917dedf44ae3675e549e7b7ffc2c8ccd
SHA1b7604eb16f0366e698943afbcf0c070d197271c0
SHA2569692162e8a88be0977395cc0704fe882b9a39b78bdfc9d579a8c961e15347a37
SHA5129628f7857eb88f8dceac00ffdcba2ed822fb9ebdada95e54224a0afc50bccd3e3d20c5abadbd20f61eba51dbf71c5c745b29309122d88b5cc6752a1dfc3be053
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54e84aabbed1e6c53a904ecb42fab3958
SHA1cc3bdb866658bbafa4eaf1ad3ed5a2a3e38b4298
SHA256cacb792cad764124155edd0a445d6e6f9b06577d5fa8f328c9cfdce9e6764c54
SHA512b811fd1522215e1a3d1a1d284f58667f1241c78956a1ed45274b64c171be314b8ac70e72d77e30e3e4dd76d275a6b4d42c462e871f46877db5becf9e7feda07d
-
Filesize
10KB
MD56c5c4403693da368c3130b357fe0fbc2
SHA11f4d77ae90210c99e3be28638d7f1a3757614e74
SHA256335a4597428ac1293af4597f2cf16529bb956865041231410563b8bd89a23531
SHA5122d34d192efab897bb3b08d7d6d851c751238a8af09217e72ae6fc6ab0172e2e7e561e84239deea18f438aebb757ab4c9de2cf3cc9e25bcc3760e34a043457523