Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 15:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.veilig-inloggen.info/ing/controleren/65e36e6683bb8
Resource
win10v2004-20240226-en
General
-
Target
https://www.veilig-inloggen.info/ing/controleren/65e36e6683bb8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 3436 msedge.exe 3436 msedge.exe 4156 identity_helper.exe 4156 identity_helper.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 1524 3436 msedge.exe 89 PID 3436 wrote to memory of 1524 3436 msedge.exe 89 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 4728 3436 msedge.exe 90 PID 3436 wrote to memory of 1096 3436 msedge.exe 91 PID 3436 wrote to memory of 1096 3436 msedge.exe 91 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92 PID 3436 wrote to memory of 4348 3436 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.veilig-inloggen.info/ing/controleren/65e36e6683bb81⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5cf146f8,0x7ffa5cf14708,0x7ffa5cf147182⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2356 /prefetch:22⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,1099494226077035334,9659995098475518471,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
195KB
MD589d79dbf26a3c2e22ddd95766fe3173d
SHA1f38fd066eef4cf4e72a934548eafb5f6abb00b53
SHA256367ef9ec8dc07f84fed51cac5c75dc1ac87688bbf8f5da8e17655e7917bd7b69
SHA512ab7ce168e6f59e2250b82ec62857c2f2b08e5a548de85ac82177ac550729287ead40382a7c8a92fbce7f53b106d199b1c8adbb770e47287fc70ea0ea858faba6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5bcd644bec59b3c23f5b91385e9d1067e
SHA1541ec71e6e711f9392c10cfe2b3cb738f0c35ce7
SHA2562254f0f838c2e2aa96bc6929bcf1814bb958b1c2b7a8b5d98409a03edaaa70ad
SHA5123e05a3807470be21ca0c96dedc6d5a48ec20f2a81fb1d462537fc363c82c9549416572cfdf53f2c196d8161505c1ad7f66cb36f7239fdb77f45460f106e1c28a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1007B
MD556f7b02ebd143eb0c06e01c1aee4baa8
SHA1d93739a89154ff6b9a60a33ed6dada8d872c44ea
SHA2566ebdf341602da307256045e819bdda7bcd8653a3e0f231fe0ee1a35e56f1bdc7
SHA512685651e5918045769bdce8576438d8376907c27654cea4b7c0267d75c59e313f8babf8c4c086bdeafb0b07a0d74bf6a4e7ac750a15c4b02cb09fe643612d54e3
-
Filesize
6KB
MD5a39f5eebaf10b9c4679bd2863e7b8531
SHA1c14088fe4b29c4a78524314a81a88c4321f3fe8c
SHA2560523568c877fbead653ad44031ca7b4f7a06dd07ede62f665da229092cfd5e9d
SHA5120eeef9c7c11806b22d30b909ae772a4ab9919531b4e7c02397213c7d9853042ff88f11b4eb220aec560867318bf42f0d8ad231327ad2e95125a346b1834db829
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d5f1b50b-fc80-450e-8208-55c14871ec1e.tmp
Filesize6KB
MD5453e8a1bc088258b16a203a65f965f0f
SHA1560a670147afac3884fdb4039eaac0b31158bed2
SHA256ad2305479888b740d391f3453a401a6c444b6159757649e6cb17c7208125e180
SHA5128657254c8f4949942397c94264c83f694a8c2d71486839eb0af1fc5aa76df93cd5ffe67683f5678e2b104d6ddeb6ce5b966bf62f5db4f1aa443750068152fd6d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53fc22ab9167f9b6a3b3d080c4fad0413
SHA1314135bdefe4524c95c58a2b4b68ccc07209ab86
SHA256e8c121788a3ee15a4a8ea2d00d78693d6825a95fd61c27c911eb7e39b120afaf
SHA5125776a6bb7b3d40a2346ae5fc98ed399696e23a53e53cc437a0dd50ac0f9cf4a5fb5022548409d4247a468f20600952267f17d46628c6864bbd0c54761c3c824c