Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 04:41
Static task
static1
Behavioral task
behavioral1
Sample
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
Resource
win10v2004-20240226-en
General
-
Target
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
-
Size
43KB
-
MD5
99aece1972266d3369107c5825982e20
-
SHA1
addce9dab2fc7842c62ea14b93dacb4526fa8239
-
SHA256
638cb3702c9fd5a3c8587bf46d2fbd1c31d1276184d6cbbb08c489c3920757db
-
SHA512
942d20471604a3f0d97cddee535df35db51977f46d365b6b6f7527d4d66ae10b526abb9cb1a94d797bfceeefa4be9da6cacbe3cf11047b116cdce8f9a3162507
-
SSDEEP
768:hQiPsMnG6wlirGl7tofQw5dx3mkHCwNwFOHkFk8AVyTDleB0ptGu1swNTeK:qiPsMnG2r27+fQAdFmkRNwFOHkFk8AVu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 3168 msedge.exe 3168 msedge.exe 3548 identity_helper.exe 3548 identity_helper.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 2548 3168 msedge.exe 87 PID 3168 wrote to memory of 2548 3168 msedge.exe 87 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 312 3168 msedge.exe 88 PID 3168 wrote to memory of 1696 3168 msedge.exe 89 PID 3168 wrote to memory of 1696 3168 msedge.exe 89 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90 PID 3168 wrote to memory of 4212 3168 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\login.php_skip_api_login=1&api_key=966242223397117&signed_next=1&next=https_%2F%2Fwww.facebook.com%2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa82146f8,0x7fffa8214708,0x7fffa82147182⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5828195457587988620,5313617196644521601,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
187B
MD54c2e0232494deeab75060e73a21a64ab
SHA1f46c43e475dc19dcdef66fd343110379d596c13f
SHA25620d9d4f906bef0d5e941d91db89a4f14c7ab3c4af57beb4dfd8a8815cababb42
SHA51218e9d7b5b1a9f0dbf13ebfcf32f840b28c974f119e21e3e71051b41d9fce6bb90a824888bbc9e626672f2c817707e08d157d7eccbcfa2d2541ea53f1cc96cd4d
-
Filesize
6KB
MD5f36d23ea92f0f970be06121fe13bdaa9
SHA12ab9b84d2027878f67211d4fdd00480c24c34bb4
SHA2569fca7396a0f5fae2d5176b9317d9c220079a2b78bf756be37abc577ec7f6ce0d
SHA512c11015794296a3178fffc3bcb101255a84f56c382f90ce5f3139c5240832ad9a7c17b250421d4765c3ab1a6ebdd50e87d83f9de05e6e34f8d30f87dea9e5d88f
-
Filesize
6KB
MD5af84cf47cbd07142801c2299c90c5f08
SHA1fd4bed2ee17f1604466de866bc245c921887f5b7
SHA25663cd25a7d88584c8d1aec5a38751f47c7d28358451d2a72d42acb9453bd5812e
SHA51202b00a645b4ac2a21d276b4ec71741e1238acb9544e3833fef7bc63a0557d11339550b67ef35418942abba782c5cf61d5339f3210d1e309607acb395d119ddee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5452e93fc58efd3d27e665762cf8a62af
SHA1c08ebae9d11fde545b8ddb26ee5508346a70ac00
SHA256f32efa5e8e7ec154e8da2b706dacd90040acfab8673ca331ed508d113c06a6a0
SHA512c9651bb941cd6924a9c5b31833662e4db93c565b7eb0303ea8b60cebb824124afade62f76d51a62d7d5e6255581595193ba03da2a26fe530c86d1879f7097b35