Analysis
-
max time kernel
50s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 13:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mywebmaillogin5.wordpress.com/
Resource
win10v2004-20240412-en
General
-
Target
https://mywebmaillogin5.wordpress.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 988 msedge.exe 988 msedge.exe 4912 msedge.exe 4912 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3296 4912 msedge.exe 85 PID 4912 wrote to memory of 3296 4912 msedge.exe 85 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 1788 4912 msedge.exe 86 PID 4912 wrote to memory of 988 4912 msedge.exe 87 PID 4912 wrote to memory of 988 4912 msedge.exe 87 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88 PID 4912 wrote to memory of 4776 4912 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mywebmaillogin5.wordpress.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8963946f8,0x7ff896394708,0x7ff8963947182⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16072839189356171681,2375881359080960959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:5012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD58f97bf36958b4466403bb092331609c0
SHA17c380ec2b137da20772a05be24e5fe2b9ef2a4a1
SHA2567283b01f62903cd3e0eb74dc0d8a71bf8af817df2c0468cb331874dd2d8e8d9a
SHA512fd3772b1e613e31dd23c3694551c29dcb35ceff621e884b67d532397d03d74ed9240bec50ef7709fa7f4bc8aa72bb75fe7c91e46d213b9c06bdff68e2ae414d6
-
Filesize
6KB
MD5ecdd41a219a640972774d2a1eb9cac15
SHA1799c1213ff16bf3c5ae3c14d8d441999d5db16ce
SHA25683d448420f5dfc660d3f0c95f9a6070500dc3c77c4cf6c453d68dac7895a55c3
SHA5127f51f3173ab078be78f86ae13434e99c06e1e5316aed6afb7ca1530561f810e274a19d5a1fcf797b7f719c81761dadb7d39b57a0599e630e42fa9dedf48090e6
-
Filesize
7KB
MD55815ee7aecacd04f6b8e8af2716e886d
SHA178fd6605586849538008cf819e1899ce67626aae
SHA256baf8be8ccbf2db38eb4eb3555acdf3c2594cf671f1050468b7bac85cc9ec1623
SHA5126dd078499d864ecba5ae1a809d0a6170bd022c00acca25df7d2e9b717c1cf174b0d5fba436185199691f37240ddbb2aef60d09892e1b8ee856fe46dbf5335dce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD533f3e0eb440468605df9427ee4992596
SHA13a2388ea5379dfdcffccb66aeaa684e9e48b13b3
SHA256fcf42b27b9c83f0a9d015e9ac74aa75c9a9f2d9d23e498be38198606bcae3ff5
SHA51299557ab74d65fc19275d182d14a7b3fd4af60e1e7fd0626c9c05b345c548390ac0f6dfcf40a3a8142380760fa0a0e80d6ded8284d169cee99964c32e072d11b1
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84