Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 04:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pdfixers.com/
Resource
win10v2004-20240412-en
General
-
Target
https://pdfixers.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 1692 msedge.exe 1692 msedge.exe 3296 identity_helper.exe 3296 identity_helper.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 4156 1692 msedge.exe 87 PID 1692 wrote to memory of 4156 1692 msedge.exe 87 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 1112 1692 msedge.exe 88 PID 1692 wrote to memory of 2416 1692 msedge.exe 89 PID 1692 wrote to memory of 2416 1692 msedge.exe 89 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90 PID 1692 wrote to memory of 1032 1692 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pdfixers.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff97a1946f8,0x7ff97a194708,0x7ff97a1947182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2696368743466908774,17376493620912203337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD502dac6ce6b602a98fa996c5dab184d59
SHA1206e59becb9617549c26664799c5b067aa08594d
SHA2563f313e909d5edf8294e3af9e67950fca63edb775430fe5228ce05a387bc10a77
SHA512eb5820ad5b755dd9e9907c063ab679a82c01b566cc9d1ffaaeea54119d695a73270a9694d9648572a6a93a907d4e74a76321f9baa7c1273d1931e882ded21d04
-
Filesize
1KB
MD5182296e91bd42c8001b7031ad0949904
SHA1d6f5e861f591ac02354c30a1da1a4fa409f2df53
SHA256c03188c50d216361370fb897707d697d51d4cd35613a9c75234290d7335cf929
SHA512f5c455c1c0cf4cf5922ecc3960d5d5aa2b0da3e79d6a73c98d4c2b467f44a6e3d668279eed2288047bef6534d39b3c4a93fab692c02cae05e0b1af74135b5e13
-
Filesize
6KB
MD565b23b6f2a80e67046b1773cd9a359f0
SHA1b0153b682e64a7dce54d99dff0a984becd6cb347
SHA256e68c4085069dc08dae65aeb1ff1748d43b630c81c2bc020c7d3c80e6ab5182cf
SHA5129a12c646785f7e0ecbc6826cfa728843454bb0713c5fb0841cd50acd9f094e263111c44fb98baacfadfbf698cba158cd8e708cfe4a3bda18f3abb4d15dac21ee
-
Filesize
6KB
MD5d25a665e2177d24dbfd78031998bd0f5
SHA189ebf800796171268e60ccb229f9a9b7a62f4368
SHA256c9a7c271415584f9536cb17b21bc17253313b16c7220303c18dfd594143cd0ad
SHA5125c5a7a22bcb0c06f4e234236a0211fb13ee124cd6f28a52eed4be77af15bd3e96848ffd95fc164284d206ed390a154745ee1b13854c222b82c318e1f06441080
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD580bf3f59e55b5d347a1bfa1399d785f2
SHA11b022475bf80c0e54ddbdfb4d239f5b9a57fe0bf
SHA256ec4b98e0bb083141014363b87115599ef4fcc5ab9a409ba46924eceb28f86a4a
SHA51283bda5a498fd8673856be3b6bab3927cf794786a12a6655922cde28bfe2428e7d2f71e19ecb23d13df293f0fe1cedd77901f1e5071dafe003c3f0f9dcb64cf7b
-
Filesize
11KB
MD500a9420c70e66f217f39c77e608f5fc0
SHA1f4996d7ace81f6ecc1c7456ef0d9d61e70be15e3
SHA256128cfa78ce9fb96a8f37fe0fec76de5c805fc3d3bb8a8b2985116a1e21ca913b
SHA512e74e9747a6f590b23efa41e95bad2d6e86aebe9fe899a8e73acd88f7a57befd50d521c3fd40f26154982137591f6eb6c8f2f9b71393f4c46390e94ff59928b73