Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-05-2024 23:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://voujone.shop/abd/abd1.php
Resource
win11-20240419-en
General
-
Target
https://voujone.shop/abd/abd1.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2960 msedge.exe 2960 msedge.exe 3192 msedge.exe 3192 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1136 2960 msedge.exe 79 PID 2960 wrote to memory of 1136 2960 msedge.exe 79 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 3292 2960 msedge.exe 80 PID 2960 wrote to memory of 2924 2960 msedge.exe 81 PID 2960 wrote to memory of 2924 2960 msedge.exe 81 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82 PID 2960 wrote to memory of 1340 2960 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://voujone.shop/abd/abd1.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa25403cb8,0x7ffa25403cc8,0x7ffa25403cd82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,9425723825421971195,9368710903457288036,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c16971be0e6f1e01725260be0e299cd
SHA1e7dc1882a0fc68087a2d146b3a639ee7392ac5ed
SHA256b1fa098c668cdf8092aa096c83328b93e4014df102614aaaf6ab8dc12844bdc0
SHA512dc76816e756d27eedc2fe7035101f35d90d54ec7d7c724ad6a330b5dd2b1e6d108f3ae44cedb14a02110157be8ddac7d454efae1becebf0efc9931fdc06e953c
-
Filesize
152B
MD5bdf3e009c72d4fe1aa9a062e409d68f6
SHA17c7cc29a19adb5aa0a44782bb644575340914474
SHA2568728752ef08d5b17d7eb77ed69cfdd1fc73b9d6e27200844b0953aeece7a7fdc
SHA51275b85a025733914163d90846af462124db41a40f1ce97e1e0736a05e4f09fe9e78d72316753317dabea28d50906631f634431a39384a332d66fa87352ff497f8
-
Filesize
180B
MD5ab6ba660ec32908d2e4a8c7303de16d5
SHA1b0fbadbb3d089b8ba2612f353d4611febae9cddc
SHA256f8364b276f1ec4d650ac7194b3e32af9b7889f879de6884b0b1ef4124a818957
SHA5120159bfc86753269b9947593e00d037658472a200c22f92a5caa025ea610fd22cb8e94012c62cc0c51fd2e235f5f8c4c2dcb04d6a78aa70b36d103bc8194ae3ba
-
Filesize
5KB
MD560b4185682be65bdf1c425d3f5d5ddd8
SHA1527ae432a81a6ee9a3fcb9dfd582e045575d7ae7
SHA2564c4319dd731a18cf693b7e0d7dd435e38f3de616926a58015e96c9d1054a4cfc
SHA51281953f043bfd58f38647a7e417a083b67756d0681c0d22e41a22841cbb62d54ddecd50e2cdac095e318c1999dc3c3b7b91d7e21ab527a5647ddc71dd2fe8ac31
-
Filesize
6KB
MD56877ac84f7517f25ad79e77272b16620
SHA18b7be0793499e2f231fefaf0e5104b5ad7ff3fee
SHA2569fda3eee4c73b4d96f324cd48b3264a8ece7c41d81bff3a3ea07c5135cf2cc0d
SHA512f5210e2de78d493c44d87cbfcbe901ddfd63524e253d05a6eccfb9b3154b5aa17b57fdf976a814344dde020b71f92995773a7a0affa5086508dfe742b693632e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55a1eaf23d6f032f190a3b3d49e32bd93
SHA13dfd610b87b5338cf8614f1996f858f2297625b9
SHA25606131d7cfedfdcd9b6390046aad3e2ddea0ffe5fdd813fcc5be0a675a5c0610b
SHA512427e6146b75d0e1f83b0b4054868cce2f103c8e4d1a202cf06fdbdbc5892c0260c89d17087f8f9a1a3a6a1fd30cd3863fd24101c46d5faa70aecb55e7fc8bdfa