Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 21:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.neopoints.in
Resource
win10v2004-20240426-en
General
-
Target
http://www.neopoints.in
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 2460 msedge.exe 2460 msedge.exe 4744 identity_helper.exe 4744 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 312 2460 msedge.exe 83 PID 2460 wrote to memory of 312 2460 msedge.exe 83 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1992 2460 msedge.exe 84 PID 2460 wrote to memory of 1612 2460 msedge.exe 85 PID 2460 wrote to memory of 1612 2460 msedge.exe 85 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86 PID 2460 wrote to memory of 2604 2460 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.neopoints.in1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb42bf46f8,0x7ffb42bf4708,0x7ffb42bf47182⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,4822075410963850755,14811592228270470844,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:4772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:744
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD5c1bf54846e210305f1bad6065bb36fc4
SHA11ac4539f52b1c59cfb2e76bd21f711977799475c
SHA2560beb06114ba09f4452a9bd7697687f047c21166ca5bafc285b23695ddd624074
SHA512d3b69efbab624452bf8a0a246a6c6141893322478ef0bd078bc4cc1ffb305987b178e2dbca0dc349a8eaa70e825d37ac8d9ad2dd90a66506124668a678781723
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5e4ec0713fa159ad9004ef15c8b9cc0d4
SHA135b926c7c7cc95656cca25fbc97742e8e139cdde
SHA256a72baa224fa99345ffd7aee3440301cd3cc9eb45bd88a8e17f6e6bbfcfc1a451
SHA5120d9b4f3d68e6b70b5c914fad6beb7316bada2b175f08bf8b1ece70d4a98ee77f5f41885f90892d8b72be1b9727b940fc52986234d846de938c67893478df7e60
-
Filesize
2KB
MD5864ed69c1690a5a0c4f69b0583453fad
SHA1e034460fcc95fb83a8261a288cf5dcac46e328ef
SHA256d138ffc887ebe621df034cbb44d0321a6b9b80066670ac7f8abae14a2388ee2f
SHA5129f2a06487486f84713486a0a09fd474c39d05dd5d4553a31e04d434463eec216bb9939e7f3ebe2abfa88f300249107d7f162b03abafed626feabaee9a932af65
-
Filesize
1KB
MD552a9c1d099f9b9a0e1b36d10f982f3b9
SHA138327193310bc6fb4d2ab5075df1fdcbb4a12431
SHA256b98855e7dd9f26e9e2fb5e4c9c2ad2df2459a45612f01c1bcac0ebde534e2d81
SHA51258d009e15d087fdf78a02f81dabea2dc082aae0f5cb0b8d636661c131a5c75f0938a99063bf50defa0aeb62d043d1c15a559570e8962695794ffda58a3b06d7e
-
Filesize
6KB
MD59d7618587687159863bd7a0ab5591d5f
SHA1046bdf8da66fa3f2e6401f396041fc6dc5250af1
SHA2567d37561147e800ad0a2315ab83890677401cefe5fbbffd565c221ed59c68628f
SHA5127e38f58d8c6da7f6b66c79cc25b9deaf80b1e5472d0226ec0279d95cd73fda71c0d42f0a9e400c6d0b1d45d624f7c725ca3704db3c1ea1d2fb1b3cdb88e598bf
-
Filesize
6KB
MD5774f9ff896dec577140fc8b8e3e1baeb
SHA1b4f279ca13f6d5f94c6802fff273244357182802
SHA256bfb188601d48d3b8f0779d63f5e1ad3987f284e0c019f4ec49a0b33f68d7cbad
SHA512bd3e39955b2d4e2b189f06717f817b0cb68e157f859d203ef20e008057f09da17c7d0aae9e17bf601bd92ef4aa05b9e049207a46df700dd4f4d7f394525ba6d8
-
Filesize
6KB
MD59c5194843f3a02d4d145c3c1a90d1e4a
SHA1e2159c248f3527e2830c2a50198f9b7d4a459a68
SHA2569ff25d1b07464054f5af63dd271f6a4d0b9fe5f95b9379947f2afe8b5b26ea79
SHA5122722962cee229059d9aae4550270971de3d72f285ce23381d7185b419821948b68e6e334bed93542beeecb043cff35816456cdbd94e1e3bc15f7d5864127364f
-
Filesize
7KB
MD546a938e234bf7d43401c7daf56faeb1c
SHA19968032ccee966200a3edf3031e5c01440f82111
SHA256036b673832c5457510b6abd500d80670d31842a918c3d2167bcce80b7ccaca37
SHA5123a9ff8d539ac213047650cc3ceb0541f08587ff7076db58ee5550eaabfa138d09b38ffabf66dbce3008795cd674040a0dc428933e737b879a84daee80671baf8
-
Filesize
6KB
MD5263d68033846c91a463e27ab99fe5777
SHA16a4118ce3fc7ff0faf407753ef1e79c361765613
SHA256c12e54f48a0eeeda61142acace1e80319fa99df92399edad81e814d7cf0de88e
SHA512cac0f885ab7b8c656cacdaa2fcd19af9c21d138ac5d9ad215719993819fb32901764f1dba97d721ee241dad087b7b06342d9244598113481ecba01a04dcc1037
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59be77e4326d3eaaa05922f584c95612d
SHA1cae638aa70ee1a20426165cd82b94dd4db8bc8b0
SHA25695d370ee6e3a8ba1346d177223f5d3d48489e0ae877fb2a9959248ca16bedae9
SHA51264308e776de6b195abaec817a9959e9eb711322cb500d27a99ddf9753dfce0c4304c1cc10f619d17108150fe71910df016f0f7f39f36405e0fd143d490598e76
-
Filesize
12KB
MD5dcf160cbe0d77b02d0b7a309f2180129
SHA12c76517510d620be6109bbefb4aa02f8eab84033
SHA256a03852785bdd6a23f14596aaf70e4562bfb3496e510d66fbf473d211df3f91d4
SHA5124c7df4d8bfc0951d528c573c29f6daaf9ccace7bced33f268af76976267af62c0c76323b6d9687a771f7bb4c9f34e1ce97925b93e16f430fc95ba3a4dfe149d7