Analysis
-
max time kernel
255s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 04:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://getintopc.com/softwares/graphic-design/adobe-photoshop-2023-free-download-1758627/
Resource
win10v2004-20240221-en
General
-
Target
https://getintopc.com/softwares/graphic-design/adobe-photoshop-2023-free-download-1758627/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2008 msedge.exe 2008 msedge.exe 4788 msedge.exe 4788 msedge.exe 1364 identity_helper.exe 1364 identity_helper.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 2436 4788 msedge.exe 51 PID 4788 wrote to memory of 2436 4788 msedge.exe 51 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 4968 4788 msedge.exe 85 PID 4788 wrote to memory of 2008 4788 msedge.exe 86 PID 4788 wrote to memory of 2008 4788 msedge.exe 86 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87 PID 4788 wrote to memory of 720 4788 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://getintopc.com/softwares/graphic-design/adobe-photoshop-2023-free-download-1758627/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdee5d46f8,0x7ffdee5d4708,0x7ffdee5d47182⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4827528054529874282,14847075682848279319,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD565a51c92c2d26dd2285bfd6ed6d4d196
SHA18b795f63db5306246cc7ae3441c7058a86e4d211
SHA256bb69ea4c761c6299b0abbc78f3728f19b37454a0b4eb607680ed202f29b4bb01
SHA5126156dd7cec9fee04971c9a4c2a5826ba1bb3ef8b6511f1cdf17968c8e5a18bc0135510c2bd05cc26f3e7ae71f6e50400cf7bec536b78d9fa37ede6547cfa17e0
-
Filesize
152B
MD5ce1273b7d5888e76f37ce0c65671804c
SHA1e11b606e9109b3ec15b42cf5ac1a6b9345973818
SHA256eb1ba494db2fa795a4c59a63441bd4306bdb362998f555cadfe6abec5fd18b8c
SHA512899d6735ff5e29a3a9ee7af471a9167967174e022b8b76745ce39d2235f1b59f3aa277cc52af446c16144cce1f6c24f86b039e2ca678a9adac224e4232e23086
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5ae208debd9a673a7d41b24ffe355e559
SHA1dcb151753444309e28eaeed33a50fbdff699ec0c
SHA2562264aee713e52b60d2009f45e9d42881cd33dea4f2bd114b6091a8bf12357be0
SHA512f4dc5080298b06999cf503aeee95362136528713af204987bb6c3d623e9238011782467d29cddcc1adaf3c33e53a2c5bbe97c97ea4e704797cbe9b5849e2770b
-
Filesize
2KB
MD5679fc8124c703b098f7b438fcc53c277
SHA15ad649eaee8638879ece78924a2c28f59d181605
SHA2567335823d14fd9479f0f98123f0583eacf631a010e2c75d6ff037a7696f7814e3
SHA51243c8bd6bdf70b9557d038c76a35c447c601efc687f129b642098f67bd0b4990fd0ef73ad8b7d09ce86074ff721846c79d70cb1cede1f2d77dae57af96087c6f2
-
Filesize
6KB
MD50b880b2747a26ca980b9e51a335c9de3
SHA133a185f2950d337769e8f1aad092d976ea95d648
SHA2568265d8fed494f0822217009833d96fb1f73e1d56b86b669141dfd2b8b77390c4
SHA51238f5f6ef6140efb22659eabda9f27cd476f7326fd6af08ec685869703e6d938518e1044615df34385dbea79c5ed45b1a847f2ca545bf11a23711fa04fed02a6f
-
Filesize
7KB
MD571c3df2c5a7c0ebd76ec696effe87832
SHA18e014b9690893919d2af4e7c73bcf577be2eb119
SHA2560585436d16d2f0e22b332db4046886e39cf20380e505a6ebc3911b17707e104c
SHA512693c781ebcf6f9be553e37428228818c4117861f292aa92a651b3a965d93f15039c91a49d5c6d208c988c290f8dcadc7c93b17f4f05d70aae61a3556c06f4bd3
-
Filesize
7KB
MD5f89e5c74b6cf5fa476bab121f58582c6
SHA127d8c2b1ac5c036d90214169299522fbd8b51a33
SHA256244417f66fe517b24e3eb238686574c3a316058974e75df2083d74db8d74bb1d
SHA512e25a51e6a370d5d49abeaee3d3763b2e5ea2930852f69a743aa6b8d136f98d6926326fe53aeacd92eaec137b453da58d4008be8d0ef9c8a8b4a405c98a03fa93
-
Filesize
1KB
MD56fc8ff12ee89b82f31f9519d4222b740
SHA10383c47aa19e51e6dce3392d9075465304bba0fa
SHA256ad8a0f73a4ecabbddb721bee11a7f25bf44aa4fc34b396ecbaaa059df3dfe28f
SHA512a998419020f0cfc0c7dc121a2a9d4536e8ae748ab3f50a178eb4b4dc65a2ada18a267fe8381066adaff7fe4b068b9d5d299585f61e7e4d67a0a3c3564a75c77b
-
Filesize
1KB
MD51ec347b0cc29e61dfca33e39e5ea54f2
SHA1a62badb5ef2b83d0587e7d9f5cb8cd3b86cf52b3
SHA256275da99539ce2caaa395f48a843281c44af1fd7b5a51f672dae66bb4eff7a104
SHA512e3b0472187306dbff4f2e587074885c51aa63aaeea188b0ec00feddffb58709da5b14cc1b4f018d7aed4bbe8e0803d11e5ed96daac0213a0a857103642d1bf34
-
Filesize
1KB
MD5ff841a180d9ae8bf3fa6a09f00546379
SHA1c4355942854e3cf21d101b40a91400454566366d
SHA256304d8db5a0fe9822313d2dc80ef4053aa76154c46454bf0f54c0529d5712fccd
SHA512bbed582788191bda568b806a9e06aca0613deb0dbc300ba2d558eb110e406ccf941529b456b7f6600921ec62799907064d8092c7f58e667ad08cc8a5fe94b9c5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e07bcd211c64b4b3e80a72adc3de2290
SHA15fa7249bd3cb4a67e6562d7af00913f770b65dce
SHA256184401ccd05368fcd0971a043d0b4e6837f0213002579b7b220d26e84f849ca6
SHA512fe9fa86e1113b8ef8aa7dbbe896a4bb5899b9eb842e88d1790aa2d7399c26a5904abeddbf480b5dcdd89a93550bd2b743123aa7ab9e205f60a010ab8e0f9b119