Analysis
-
max time kernel
247s -
max time network
277s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/02/2024, 21:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://9285ab182537f6b1174ebb434066815576ab32a4afcebf320eb9c0a4b0.pages.dev/#TGpKUSI6ImIiLCJiMWVOSUgiOiJiIiwiYjFlTklIVyI6ImIiLCJOSUhXdyI6ImIiLCJlbSI6ImEydHRZV3h6ZEVCMVlYSnJMbVZrZFE9PSIsIkhXdyI6ImIx
Resource
win11-20240221-en
General
-
Target
https://9285ab182537f6b1174ebb434066815576ab32a4afcebf320eb9c0a4b0.pages.dev/#TGpKUSI6ImIiLCJiMWVOSUgiOiJiIiwiYjFlTklIVyI6ImIiLCJOSUhXdyI6ImIiLCJlbSI6ImEydHRZV3h6ZEVCMVlYSnJMbVZrZFE9PSIsIkhXdyI6ImIx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4292 msedge.exe 4292 msedge.exe 2372 msedge.exe 2372 msedge.exe 4164 msedge.exe 4164 msedge.exe 4252 identity_helper.exe 4252 identity_helper.exe 480 msedge.exe 480 msedge.exe 480 msedge.exe 480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1096 2372 msedge.exe 73 PID 2372 wrote to memory of 1096 2372 msedge.exe 73 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 5024 2372 msedge.exe 78 PID 2372 wrote to memory of 4292 2372 msedge.exe 79 PID 2372 wrote to memory of 4292 2372 msedge.exe 79 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80 PID 2372 wrote to memory of 4184 2372 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://9285ab182537f6b1174ebb434066815576ab32a4afcebf320eb9c0a4b0.pages.dev/#TGpKUSI6ImIiLCJiMWVOSUgiOiJiIiwiYjFlTklIVyI6ImIiLCJOSUhXdyI6ImIiLCJlbSI6ImEydHRZV3h6ZEVCMVlYSnJMbVZrZFE9PSIsIkhXdyI6ImIx1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffeeeac3cb8,0x7ffeeeac3cc8,0x7ffeeeac3cd82⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,8274563724762361611,7558876603334552092,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD596899614360333c9904499393c6e3d75
SHA1bbfa17cf8df01c266323965735f00f0e9e04cd34
SHA256486e4b4bb11f664c91c675e73cfeabe53b5009ae719459813be17814cd97e43c
SHA512974735b40a9f92b40a37a698f7f333590f32ff45633c6e619500e74ec274bc20bf7dbc830b1685777b714d37a3ca103d741ee056f4ff45ef08c07b38a7895df7
-
Filesize
152B
MD519a8bcb40a17253313345edd2a0da1e7
SHA186fac74b5bbc59e910248caebd1176a48a46d72e
SHA256b8024fbed11683ef4b53f5afac0ff691025b7eecca0f6a95737da1585558227e
SHA5129f8780f49d30aad01b28189804329aeca6ad2b7ffb6be505d40bb1af7802bb62622f518cb1c43a5815bbbb46638f6c52aead3d68f14fa957d18157edb42e95c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f2f744ea39047cc5f7a5ee828ffe4618
SHA140026123b46bf4102b58f7ed48c3fb9a778ff6bc
SHA25684dc5d626db83cbe5ce5f2f7175a2150132150f346fa9f042ef51f0100ad9235
SHA512781eec24d7f8fa9a0efe840444b1876b22e21bcf3de0b4a5afd08472927d18b86004c00503a0bb0983ab7b189325d8d44271e6b7a1f8cccc49cde1b7c0d0ea26
-
Filesize
888B
MD5bf8f5365bc7d0cc703accaac1f881f14
SHA1fbb2488bd58d17cef1401c20444735bbb0e21621
SHA256e4c30e73bdf36e7ab98bc93994d7f671110c44574fb68134b345be8016baaa78
SHA5128d478e3f530f8a5ec3756d33f3279e81c0c7fa2960dcc903d33f494772d0f9556f788059c50d843f535aca4a21bbdcd906e7bce0ee1e3f09898f905e13ab75f5
-
Filesize
6KB
MD5a64ed3f2e9af73ab534564602d81d2ee
SHA11cc43ff74f5477ec63e6deb2290dbaf00096bc0b
SHA256a10b89ac59437bf7ebd56fd7fe559db887a9e6ce217bded4a630e963949d39f7
SHA5120031c069b586af51b61487b0cc2cc22fa5008fa3802d0592c44b60cb16d273e29dee3da75d908bdd798a87b7b30c5ef0ac2510ccea67fa7ac616601d5a907d1f
-
Filesize
6KB
MD556fa23ac16ad8e52d866d5eb4432aa6f
SHA1d304df835f2e445669b358b9356d711e9cc6e374
SHA256ba3ff09bf385c17997f4a4faba6b5667baca05733e0dcb34da6cb987ac58fe9f
SHA512ca5cd2c7b7dd3f8d449ea994a11086b33f97de8cb37f5324d20541f7ea0f00c6831eee372535ce6334010f47228c7d1c2056420e191b56fb3124d7909fa1bb8e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b13e67f2e58c9e6cdc70e526ce1d518d
SHA1dbcaf457b8bb11950a6ca4936732493105086bcc
SHA2560e016d4d7398e1fb79f23edec25ab2827c547e25b7b2c386c8862dcfa29a0e60
SHA512e5dbcb0497488f6d8cf2b4eda305d5f22619c822b4097c4f1957ffa9ac5c8e38be9e729412db706f81ffbeccb22a2c618bca10a703445e1a2906290d6465e028