Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 14:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://zion-jerusalem.campaign-view.com/click/111101e49a9a97ba5/111101e49a9a978ff
Resource
win10v2004-20240226-en
General
-
Target
https://zion-jerusalem.campaign-view.com/click/111101e49a9a97ba5/111101e49a9a978ff
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 2740 msedge.exe 2740 msedge.exe 4440 identity_helper.exe 4440 identity_helper.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1084 2740 msedge.exe 88 PID 2740 wrote to memory of 1084 2740 msedge.exe 88 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 4928 2740 msedge.exe 89 PID 2740 wrote to memory of 3600 2740 msedge.exe 90 PID 2740 wrote to memory of 3600 2740 msedge.exe 90 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91 PID 2740 wrote to memory of 1720 2740 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://zion-jerusalem.campaign-view.com/click/111101e49a9a97ba5/111101e49a9a978ff1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa7ebd46f8,0x7ffa7ebd4708,0x7ffa7ebd47182⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13353333178293181851,15515222398010837123,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5cef8230de78c38d83c47225a27bd6626
SHA1552a7abf78a87cc925485d2c18edabb705197ac7
SHA25653fb0ea618398ea66149967f6477de154927d8e72b423ba0868c7e9e7ece6d0f
SHA512dadd3f1b2f375c4d7f5a28cbaab3f9739be0c584a5accd0a7499237736353a41123d1e67ecc25ee83b15d3679b812fb2aa125b8e67b2cf52990f681ef5af95aa
-
Filesize
2KB
MD577e46205fcd08c0770b036762732515a
SHA1121a989c33f505d379da09ab97d9dd3cbee0016a
SHA256425cb01867de7623ba93ee9daa00fb5b3e7ac9d70c67607f10792fb747afd4a4
SHA5121177dbbeebbb807638f0b4d004414f8c20e8d05bc71586d8ccb3e1878ddc3f1d4e8a5d3c90e9b808e03ae6fce905635fd06fe86330fd41349ce06a0ee66e7241
-
Filesize
6KB
MD5ae1319f9a614c74e0e67dbd75da63b17
SHA1e9a45ba652e3d6e37e5d66d6cd023f0442069f2c
SHA25603a0d0b1a1b067138c698b34d4605271c0686a33ffc3f1a2289403011d8be151
SHA512de99e354ea11471bc3774be931d9a517360fbab4c992fe002aaa0ccfcddc4a1f30c0ee4ca5ec9c985dae2025b685d2e3dcc7c8c5be05fbacabfa99929eeca982
-
Filesize
7KB
MD56f1f31d17e23b51e61864456c6ca0dd1
SHA16e4f67f88d437aaccb0b2dfffa7f9e4e3f4d271a
SHA2566c600e476579eb3ace7ca73260a228e689aac3dabf8132d9feca78c9248ea41a
SHA512b6a6fcd2aff9d28bd20671e7936d49f543416e9e1a04a2a17a95af960c2f2a53a13da1c622cd66176da526c1f70dccc3f03359e7ed7bf42a69eab905d711a373
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5547f1c2975c530c824829527a61ed915
SHA1da5f35e9022620d7d7cc5fca952dd185f2ad96eb
SHA2567206bdb328f1f63a913e72a75332e640f6abadc7d274ddf48c135d9d93ea94ff
SHA512a278528a6dd693507dbb9f19cb006ec532d3236aeea6fc60e51f74dce957d3521899f6324390b4524d79a8a19de1a24dfa8034765cd7ca8887f9866adcbacb36