Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
Resource
win10v2004-20240226-en
General
-
Target
login.php?skip_api_login=1&api_key=966242223397117&signed_next=1&next=https:%2F%2Fwww.facebook.com%2.html
-
Size
43KB
-
MD5
06c847a1da81c081d6ad39eb93d02b05
-
SHA1
0c87bea78468eb46a4d0f41130544b0b5d4a7732
-
SHA256
71c0b8ffd61b5ff31f4989daddef1ee42f2ea5c66db1943f4bdb3bf612809faf
-
SHA512
679b1bd56ad602680d55acf04a85221ab07eff4bd30509a91f788d46f6136556e53b7c8177f9ef5f2e4de41b95fbadf37586c4a653038ce576bfe7f2d9dfb780
-
SSDEEP
768:RGmD7ciPsMnNzBRYVWdGl7to3HsC9IoT3mlHpMNwFOHHNMHN8HNvHxBCBVgYB6lT:ciPsMnl7d27+3MgIoLmlaNwFOHtMt8td
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 2824 msedge.exe 2824 msedge.exe 3588 identity_helper.exe 3588 identity_helper.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 3324 2824 msedge.exe 86 PID 2824 wrote to memory of 3324 2824 msedge.exe 86 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 5052 2824 msedge.exe 87 PID 2824 wrote to memory of 4208 2824 msedge.exe 88 PID 2824 wrote to memory of 4208 2824 msedge.exe 88 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89 PID 2824 wrote to memory of 2080 2824 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\login.php_skip_api_login=1&api_key=966242223397117&signed_next=1&next=https_%2F%2Fwww.facebook.com%2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9436246f8,0x7ff943624708,0x7ff9436247182⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16648984352918315226,8859342115686796815,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
187B
MD54c2e0232494deeab75060e73a21a64ab
SHA1f46c43e475dc19dcdef66fd343110379d596c13f
SHA25620d9d4f906bef0d5e941d91db89a4f14c7ab3c4af57beb4dfd8a8815cababb42
SHA51218e9d7b5b1a9f0dbf13ebfcf32f840b28c974f119e21e3e71051b41d9fce6bb90a824888bbc9e626672f2c817707e08d157d7eccbcfa2d2541ea53f1cc96cd4d
-
Filesize
6KB
MD573da7ea44b83e478d9bcc2835bde19e3
SHA113d6c11b8299242de382067ee261615433e07564
SHA256a8c8e9b4672593ad4e90e493014f41781ac3331d6738cdcd335f73381109c178
SHA512a344bb4b60c98146e7a1b91542e3ac125e5455f0e96e41e0758585f94e5349861f29ab0e4e0c22f4e2d11e6f50521fce52ea3de07ca5b2cb50c70cf6cebbcdb8
-
Filesize
6KB
MD5e71a42c5c1df03558b0e57589e811aaf
SHA1b2ea997ccf9ea135091fca927d86c31e0b3d394b
SHA2560b95fa6d101221982d0bd1185f80d54782a84a9435b2bac455bd687e31525f07
SHA51210a260d960cdfcc887e5ade0fbb54317b0a55516280f83dded86b20783a7b71bb2f7ab4c1f1f07b1a5aa6337006b27fb5b9856ce1e6ac3a985f3e5d627c48256
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b535008eb9c37fa1e513f215ce9d7609
SHA1ab8ed8654430831a6dd1af3b3a1bdd47ac9231a2
SHA256cbf662615edea68478684240cbea7390c2697f64af9ae56f883ef0f535579be4
SHA512e5e60388eaac2ae97d4225e555aa0391993a1f7dc5485dc282f594ce115ac6e81ef7cdf70461d1613bb5cc85a408ebdfd91c0752dea3969e1426c3e065337eaf