Analysis
-
max time kernel
1167s -
max time network
1170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 13:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://boocare.weebly.com
Resource
win10v2004-20240226-en
General
-
Target
https://boocare.weebly.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2068 msedge.exe 2068 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 5580 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3352 2068 msedge.exe 86 PID 2068 wrote to memory of 3352 2068 msedge.exe 86 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 3852 2068 msedge.exe 90 PID 2068 wrote to memory of 2240 2068 msedge.exe 91 PID 2068 wrote to memory of 2240 2068 msedge.exe 91 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92 PID 2068 wrote to memory of 3028 2068 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://boocare.weebly.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd532e46f8,0x7ffd532e4708,0x7ffd532e47182⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,18251008246675301496,6959141738220886472,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2628
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD545a7b74b4bad7d1932a2966d7ba3dc37
SHA17259f67ce19d57f7f29a8b9b853a1c142a076a6e
SHA256c2e051c6dac2051dc80009f1e4aa8e33625e350fba1bc51018924b315ae44838
SHA512237ceda7cdf7c638ae36d07e93eb054713951bb5700c7b9f9c0ab09821196677a44afb1501eca52ef43ff825e343f23024766abebe575f10755b85603c5e4631
-
Filesize
678B
MD51ea332a36abe2c98ffe7a60c253e38a0
SHA18194547dab569d2fc21d04363091bd452ad3c792
SHA2565ee8c8eda9be274c53e9d9a78fac8642625d76f3698e63b1758692419a702f3f
SHA512cbc2defce1f3088e9d91341ca0bc8e72179f03e551a952cb26a07aad602b022a654b1e0f85dd6518b11eda1ef73e2a41c370f9eda1159ec8d912a52c93716e04
-
Filesize
6KB
MD5f1bd6aa3b33827f5f69b85deeeed77ef
SHA1d44acbbd18a67cda4e4ad166e1ceab0942a8dff6
SHA256483f88748353f811185498ec2f8ff92c23ffc3fb7933956b2b74f3372f8f8c35
SHA512fbd0b79755a34b3836c48d8a227b1e1c9b7c4eecfe8b359425c858fb082cfc43bf634ee85739825381bb3a05d1beb4566416b4ce370bff57551b59d76ba00241
-
Filesize
6KB
MD5bcd97adba5ef0a2abceabfd43664d371
SHA1cc058218274eaf4eb08ac1bd04161dbe47531167
SHA256c956bab363c7b1d684728453e786f8bce41b26a12118026800b8f1d5841c38cb
SHA512d81006b3ac707ec1885f98d7e44e4df7941c75d8f108c01c416d4d03b97c0ff57734f0d6553c8605ce9088dd065f984e01cba8b0a2b64cd67144e7550f63cc37
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58574b57b6a1686f374ecf6587f660e96
SHA116130ebee43a96ed56ed64c0ab0bddfbf26b1c5f
SHA256376c16ed41a605ae63492ca810ebeb9204cf1b4d3697463e60ebf07e9640928f
SHA5120d80bc9121e0626060ddb5f9fc8e7b9a08a489b5829579ba158cd08a0f25cc3d36b06fc6af23f5725e3555a420850b36ae4eb81cf55d022817d1665ea4cc696b