Analysis
-
max time kernel
128s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 12:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://adobeacrobatreviewandsigndocumet.se-sto-1.linodeobjects.com/outlook-office-com-automailerbj-7634-3434-234-2324-azure4324-office3653-7644-4443-434.html
Resource
win10v2004-20240226-en
General
-
Target
https://adobeacrobatreviewandsigndocumet.se-sto-1.linodeobjects.com/outlook-office-com-automailerbj-7634-3434-234-2324-azure4324-office3653-7644-4443-434.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 5108 msedge.exe 5108 msedge.exe 3336 identity_helper.exe 3336 identity_helper.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5108 wrote to memory of 644 5108 msedge.exe 84 PID 5108 wrote to memory of 644 5108 msedge.exe 84 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3780 5108 msedge.exe 85 PID 5108 wrote to memory of 3652 5108 msedge.exe 86 PID 5108 wrote to memory of 3652 5108 msedge.exe 86 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87 PID 5108 wrote to memory of 3180 5108 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://adobeacrobatreviewandsigndocumet.se-sto-1.linodeobjects.com/outlook-office-com-automailerbj-7634-3434-234-2324-azure4324-office3653-7644-4443-434.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdbdd46f8,0x7ffbdbdd4708,0x7ffbdbdd47182⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13991163827981143583,12912092041323922008,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD563b16112feb59864f2b57ad1c3cb8916
SHA17babc45d04dae79006833bfd2cddd9e0048341e8
SHA256c7d9941f42219fe93703e954b23368979dab80a94ad00d8f4298ae354ebc7429
SHA512c3fb95fbf533619f99e70467b4b58e207e0cbfc21d1b8c2fb287e40a672a2df3b67f6d9d33efe50a0af93379c0e10253f68ae6bbf159953517887608236d28ca
-
Filesize
277B
MD5a277b202f4124aac1957e23a5aa66d5d
SHA16bf76333d370c9b312e4e7b7fc778c0098f9a496
SHA256fda512ad9a314d9cc56957deeab244bd0ce5bb096b149ef9c23250f95f76f584
SHA5121bf4973a41b025df1a035060a54d72ffa6a708f268eb281361219533e7bbdd36caba22f4c0d5a320de0701b938a5eedacc3238ee2fc5adf95f1794b26f1a5e44
-
Filesize
6KB
MD5bca00aab37fdefeed8fdb668479f6fb3
SHA1e57db4548642bc74db41e1029d36ae876243ca9d
SHA2569c031837c26fd729d15e2abc1e4907be1366e9f479e0faed5f653938f3587e65
SHA5120813b403859dbb236f870c60cc3583d06047c1dd489cccf92c18d675518bea32979a347cb5a5c79f4e702a49557ee102a037d3755cd705f0a3340cbdd7b1eb4a
-
Filesize
6KB
MD582abc610474c7d8a1b651def714ec199
SHA12a3c1e60dc413e636144980fc6f8d1dca4c8f522
SHA256f4b37cfa91142f54f2ca17450dc8398f2cad9e2c29ea068dd5ae9455e00b4319
SHA512b96a0ea12f0365459ee94b06aa93fc3b5f1a126abeaad0fc0845b3e600f57b08d149a1e23650ae23cddd6eceba5fc1ba8b509f3f426090c2612561b1445fd3e2
-
Filesize
6KB
MD5886fa671fc211631c996c92b7c894d29
SHA17af7d37c2205c9e7b62cfbfa6e1a599f653d3ba0
SHA256706eeff7bcea24b67350a927d460e78818c0ea926e794d41568472ff5a473256
SHA512b742edc411d028871178537a7aac747359924033828bdb82c7119602a9cd6962242a85ec9bce8a724454067118a8cc4b9a79fcdb74e52fbb39398fe9aa548e83
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55d12f4a69c3e368f73924b6bbb36f659
SHA1b8d84a9b4e9e43756ff7500b8668924a8f1ec773
SHA256c6a4059b65edccc7f3b315fd8a78b7f092a7e3bddf7f27e64599b5d5604a8eef
SHA51274cd4481dae179e31482dd41698fb7a95da5a2d65383b1e7dec32667a2b8f250a2377cb290090d6a3a31ea0b4d8906df22a3d7b02b1e6e2d8a4a0165818200b4