Resubmissions
29-03-2024 14:27
240329-rsljpsae3yAnalysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 14:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://souq-deals.website/6uh4
Resource
win10v2004-20240226-en
General
-
Target
https://souq-deals.website/6uh4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3960 msedge.exe 3960 msedge.exe 3040 msedge.exe 3040 msedge.exe 4968 identity_helper.exe 4968 identity_helper.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3040 wrote to memory of 3476 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 3476 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 4524 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 3960 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 3960 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe PID 3040 wrote to memory of 784 3040 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://souq-deals.website/6uh41⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd53346f8,0x7fffd5334708,0x7fffd53347182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2652 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12165643673985577119,4784880867943691344,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506Filesize
330B
MD5a69c19bf3fbcd41d86c5cbdd8637fc71
SHA1400ccda58423b141cfbf2ff86209e923df24e25e
SHA256ebe838e9442ad2003e8528793223567b37181c80846d5b662c064a83e20ead1f
SHA5129463cfbe7fa6b22d0eb3a0f258fb8d4532e1662ffd8f9280337609a6c5f7aa2a70395ed24137d0d1d0255d3ecca1cb6ad3f5b67942e914f6bd1c2f5a63bbc558
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
456B
MD5b66b97a3329fc40eabab092a6b7cfa37
SHA1b254a543a44ad0d7b6b7d96eb640f572c8ab959b
SHA256cb0efc988488736564edbbf0d1102642c490e7f9b5f14aad4256b299c27f8bc0
SHA5128075a6a8d5fbe1939dec2cf777fdcf06f39f13d8724b693ab135bd52df38630f3219552972dcb7f31c3df71830285090b95fabedbafc58f69f4e4d114b8670e3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
875B
MD5f8bb894327e96166270e85f09413ee8a
SHA19c4158de68b6d6cda9b52b1ea98ec4da107e0ea7
SHA2569cb38ddfa232ce3c78a36b6d2acca5dcd97cb9110476a66357b32f7c2d0248d2
SHA51262d17517e446ff221ec30ab8a429fa412345fff6e9c5943c763eae6909a3af18693f9662cfc0dca6406192ead092322e9c3d471b168f2f9299d18d86f41de4e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD514a66c584581dca17be8bcce0393e6f7
SHA1e86d865545f0f1a5a85d19cbf3288029e6722308
SHA25668c50637d5ad458aa0cf9698e27b133d2c1216d5ba6835f827fd4e94c5992834
SHA5125b67a22b8d060c420320b9e9e0db16ac7a76a7bb547dca4bfedc7480c6ef8af88a8d59cbe7dde6871c64b074463ec1b0285df74ef24e11c0d849ca934c800abb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD57cbcf58a1f779bbe7a049bea284f7aa2
SHA1495c00b0f87f1c740ad7d49404d40be768f87aeb
SHA256fb9e170a5094ba0c8c8add1773ce5aba9213877772660642e039b096d2d37319
SHA5128a2631b3ac8b2be18498e499ba3845ea2b186e5bcffb6a6bbf6c1ed57ae176194d14d24d840ac5ac6059224056d8c905c35969c656f99f42cd6a4d72bcd4dee3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD505ab374fb2a070b39443f983a06fbb98
SHA184cc1e4dec5854c5bf732a32a6ebde4b4d6f49dc
SHA256badd6b4d4e73a307f926a93db6de15d3fd2b5e2e6c7da0c1c3f8e09e1ad6e43d
SHA51231766e3fe790df98be147218b09467dc8affaf9b32c39f1a80ec35754190451f057db5af2e461e20cf9409f8aa67f513effb9f97a639e475e9e9f596e56c3bbc
-
\??\pipe\LOCAL\crashpad_3040_FEUJBACUYYYOQCFLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e