Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 06:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://expedia.confirm436128.com/62hppugz
Resource
win10v2004-20240226-en
General
-
Target
https://expedia.confirm436128.com/62hppugz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 2088 msedge.exe 2088 msedge.exe 3092 identity_helper.exe 3092 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 544 2088 msedge.exe 84 PID 2088 wrote to memory of 544 2088 msedge.exe 84 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4972 2088 msedge.exe 85 PID 2088 wrote to memory of 4492 2088 msedge.exe 86 PID 2088 wrote to memory of 4492 2088 msedge.exe 86 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87 PID 2088 wrote to memory of 372 2088 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://expedia.confirm436128.com/62hppugz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3a0e46f8,0x7ffd3a0e4708,0x7ffd3a0e47182⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,13005280446046832521,7958413986687985698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:5016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
6KB
MD505b4e434e88cf9d32d8af57b70204822
SHA1f158e2a76b485e984ff5dd9b222c5b8c433a481e
SHA2562e54997041c8c44d935cf7d17152e24ba6f4c6fe0b83a63b2a80ce65ba384410
SHA512154f4e81a41a874bac9dca03a04ff9656b7f316b1e1d3a1721ebf5f96385ce89e2f9921d32b158270ef96c50064278acb8bd95b0a50631a5a3435ec392ff9e01
-
Filesize
6KB
MD56d127dfdfd7223d1714c3eb1ad66744e
SHA1b67f22b5205501fd5aef3dc3ba19f08a3a01dba5
SHA25691db8a3356d18cf51c60d2fb1679c42a0b68d46d113e5d512b3e9e078aacdac0
SHA51208d74aefb9381b40c4e151c1d29bfa7c9e28674744662974df7f9d0bf1c2c0c1f87a2dc9e28be69007904b6ec1b84c61f9f6a932733f42d0c3c99703e7fbcc1a
-
Filesize
6KB
MD5fd1ca347313518a3b0ff53e9a3318c12
SHA1af78d94da129b74614f7ccb80bc8e2b995e9803d
SHA2566e87196343f44669c0434aa2434df522618a697ae0a42b5fbd31e7f40af260ed
SHA512a864cb2463762126d4c54fe8a2f018be70901170c3b6e1c7d126afc640e63b49e61dbb1ca4553589c779bad51ff7f90fae04ffddc1086109e4f0d4ae94591e0e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5929fe6ef82a3ad26b5dbabf65cee2068
SHA12a8cc2dfac1dd5bfa55d892080badc1ed354ee45
SHA25663b70006d7734504334ec2621321e9d6645771ff2c8bc95d27c46f0dd928614d
SHA512d1f35360ed093aae2be7af0c1cdf9bd6ae8fbd597b7e1d713b7b7a098a489375c445b14d9764d3374222fd26e6d8915a5684cc3bcfd3225aa2ff31f874386d62