Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 15:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://eventbrite.com
Resource
win10v2004-20240226-en
General
-
Target
http://eventbrite.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 408 msedge.exe 408 msedge.exe 2644 identity_helper.exe 2644 identity_helper.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe 5984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 764 408 msedge.exe 89 PID 408 wrote to memory of 764 408 msedge.exe 89 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 2676 408 msedge.exe 90 PID 408 wrote to memory of 3404 408 msedge.exe 91 PID 408 wrote to memory of 3404 408 msedge.exe 91 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92 PID 408 wrote to memory of 4432 408 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://eventbrite.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8650546f8,0x7ff865054708,0x7ff8650547182⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2244 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,250223823200192129,5665798189866557350,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5e5598ed35dcc60879dfa73c1bc5dddfc
SHA1e15524eb3449168942a6ca0dc2f51e9e15464bf9
SHA25651ecaec10dd29d889c6ffa7c098ed859a369d5e2cee8d2c1196b68382b925ae9
SHA512f7608483d2e1ee312152eb27fa2f1de0efef374d5dcbe11ceafa0fbdd6ce10a5bdc2b2c52dd69c2d6a215b51ae2d8ae9766e3940d1f150940b718bedd58368ba
-
Filesize
2KB
MD57ce48b747d6c62d9c8fc0a9e6214702f
SHA1a8bfb83eb67e662e6fc61b3e5b904e6aa7123695
SHA25629c5b763e283847d73fd44fa4c91e026f0c9e610face7cac4de50ceea4a2acf1
SHA512e6d07e33878ccb8528c567fcf818b35e645edd7cd47464bf80dfc9b5305a74d910cd3b489408faac544e24f52a32d41a0574a136466947b202e0a89745a28bbe
-
Filesize
2KB
MD54c83206d5fe35202811b2ca8fcfc1862
SHA17c4144dd70494adbcc3f3e9ac636b8abf15fb4e2
SHA25684247fc0d4c92647a7fbc30c9e8fc544f9a9598a129ec28773c0086c56ccebcf
SHA51222dae4b3cd6253db2f1df2c3dee6ee43735ef70d9eec1b40aa1d7f6b727cbdd455f34b6e5d37cfca86d5703aa4e90a2f327efbd3e784a2d7cbd22ec5310d907c
-
Filesize
6KB
MD5f3631a936067e2307e268f194a96b1b0
SHA19611c519ec51fe1e83f1017b7920f6eb364c8f30
SHA25639a95c84faa867e0fb125a2be92e94f3a49aced92294712cbdaa89a62eb29801
SHA512cba0f2bc9f29a3b78e19abf6fcefd867254e1840a9552fce02d38547183cf71f810b669e6222667b03081e23242e022883fe6217e9ef3b23049f943584b22cec
-
Filesize
6KB
MD5850aab9fd7c21e06a34a0b31c0874164
SHA164f24c208bccdb5a6805227f300450bca7c55a5b
SHA25697cd148cd69558e8ce37dae7d22b1f46b0b2af70d51f415bda9bae5368e9d0d3
SHA512e22586b9448f11f70283371dc14a4b8bd819dfdf93dd091f381fcbc18992d49db6eef42d4a0673e2a0c8ca613ff5832ea92dd15223b4ae62c28fbc701df2d5da
-
Filesize
1KB
MD514cb16724631617cc5a228ad99269491
SHA10a9a2d75aab72e45d635ff275fd631ad12422fcc
SHA2567d7fb3a94bc25150a61025e90684f53486fc1f651200d9d981c04a95bb4fc7f0
SHA51224bb14354a6fba0c4ca872022b8f9f8fa836ded7d5026321a2cd60bfb12d3c724665c79ecb28b350ca53f56cfa3791b7e2f2f9290ba11666d11b82f14df20833
-
Filesize
1KB
MD529a05e9505019de7444e574b48c24ae4
SHA1a89285b5626098c2219d591a1a1e6109da3a3563
SHA256500b2d03519659edcbef76fd1f5d1b3d7e076ac841546c74f54f41dbc4e92a36
SHA512acac3dd0503886657ef50173a324f13f4e223d2f51823301060ad6f75544ae3cf5d41150d43f143c73cfca5b3c3c6232aad33f2aa4a0cb4031b03baff0ccf539
-
Filesize
1KB
MD5d0a4e7c86b0a7bf25418615cfec0fd12
SHA11327bacf81f52397d1fb5644a2b858bd6c8b0120
SHA256098766ed41941d5b88e4da974ab00ebd6d582b23a4b1416e461da05e5c9c3825
SHA5124e12e7829bdafbba5504805127567b95b2b06ac1806a871ece52803fcbe9eaf9bf52245679b827acfc4c89b29cd9068abd645c47ad5c3777050fef7b02317f24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD526e15e8bf7d21a9d9e3018a149b9c2ff
SHA1791c7f460d3fa00e04668e235d6be79f7ee4b074
SHA2563f01a98882f3774e577f0bad2fd1e0485fabd329cf5f9d576db59364cf564309
SHA5124fe6fefc365539764f8fa6041848fb398488babd9f75022fc0351981eed7f613ac9634d6b2420da3f4eeee3f5d27320752f59cadd41570acf14c708cf537e599