Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 17:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://budiluhur.ac.id/
Resource
win10v2004-20240220-en
General
-
Target
https://budiluhur.ac.id/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 4944 msedge.exe 4944 msedge.exe 3916 identity_helper.exe 3916 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 2904 4944 msedge.exe 28 PID 4944 wrote to memory of 2904 4944 msedge.exe 28 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1876 4944 msedge.exe 88 PID 4944 wrote to memory of 1148 4944 msedge.exe 87 PID 4944 wrote to memory of 1148 4944 msedge.exe 87 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89 PID 4944 wrote to memory of 4116 4944 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://budiluhur.ac.id/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffadad46f8,0x7fffadad4708,0x7fffadad47182⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6449461392338510682,5394054813983460839,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b1f40e0d6ceaf161dfc1dfdddcfc44af
SHA1b6557a6331b4c54efb30597ad4da0be03013a23e
SHA256065557e5cddcc8022528dc82c5fd618ca28c153d6e34978d2ba84d33227eed48
SHA5120d7fd3eabf2d2b426c627531b29e433cab175232c169a77623213b7b9935458b3067a2860137b030235526e49ca4df6867534135cf9da60697d6fa43441e7818
-
Filesize
152B
MD518bc1d880e1a43364e572a20540c025b
SHA193b7043da91e7697d7268a52ca9a434a55ddbb75
SHA25611fcaea6cf095ba038a344829e699198e7c981149f15e30a51229b8dbca6937f
SHA5123e8ca38dbd4d9aa865fdfa359033fb47f581b93842f1ccb667f243cc630bfabf8390cbf8ed1de6110b18819f0d831312304806667bc68fdd13ea1bb09b44742e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b77b6449a8e1dbb46f7300ab31b36c8c
SHA1800e0b12711c9cdf3382dda3654dd68e599f34fc
SHA2567d7803f9a31e3d1b8bc46724b98b5910d69a388e8d91376adb49c3466c8acb64
SHA51277ffa7fe5ae486da0e1366722fd972944f77370888af14432911d8364a77e1d7f3305db4b91ae639d5c0b08e2476bb2475cfdbf053117f89a65846117a14cc1b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5e0a247fd533561dce2f28a322f7d38de
SHA1ff669f7202f717bb1aefe8d6bf5d4b60e1ae4976
SHA256252dbb9aaa32a53d21e5694b98dcd2611756de4571e21f895742b247e1111107
SHA51201c937d802b7b5b67d2dd683ff6520a2d6112e79041de4fe0a6e3ed7939190947170287317deb2c4a2dfea8dfc693701da44fa4a5efdc6c23515e7dec5102115
-
Filesize
7KB
MD55bd1116793dd8238ebe5276933229e27
SHA1d1d518ffe1993077620fa1e13372f086d52b84c8
SHA2564b2c57593037a82dacb76f2e5b3e053ca69746c44096f5c36ea6cc8dd2364e00
SHA5122b9432bfaf9b4e625e7e06401478d8fa7128a24f8fab99224d4ee60a4469a1d9d73daabf73946581fe658547133a68b33e1256291eb7c05174cb8be77be859ee
-
Filesize
6KB
MD502787959db80ccfd70133f1c81a9bd16
SHA12132cff1920aff82b4a34093f1cbac695e9eefe1
SHA2561dae56d60510643fddddf46338f5e01955390d3c12826863e8e105b95c1d0370
SHA5124fc64dffcca22ece2cb074ebf4c33b80e9986f0f991276eb43ce6146b192b16abd8beeccfef9770ef7701b4ddb0635451a392ef1e812ff44df5b5948f8192e90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5489886c392fa8af5b3f784e6cdf888a8
SHA114dcbf84a03731b010670883f142e7761c2d13e1
SHA2563a0a8bbf5c9337c787ad6e6ba3bc8c710209133c6825094544a715d74c3c8749
SHA512a426861df54d0b0331e8aa94555d61f4427dd3549ba71c176752916c23e7f8dccbed7a0241f001a2413fd0db90a7a353d9dbf8a5281eab77d00faafe774b7d19