Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 16:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://promo-exclusive.com/login
Resource
win10v2004-20240426-en
General
-
Target
https://promo-exclusive.com/login
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 2448 msedge.exe 2448 msedge.exe 2004 identity_helper.exe 2004 identity_helper.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1744 2448 msedge.exe 84 PID 2448 wrote to memory of 1744 2448 msedge.exe 84 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 3548 2448 msedge.exe 85 PID 2448 wrote to memory of 5060 2448 msedge.exe 86 PID 2448 wrote to memory of 5060 2448 msedge.exe 86 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87 PID 2448 wrote to memory of 4028 2448 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://promo-exclusive.com/login1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe48be46f8,0x7ffe48be4708,0x7ffe48be47182⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2736 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4873374105125569765,1558650963583095278,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
187B
MD5cb64ec5f1327edd62bf7a6d4aedcdced
SHA191aae25e092636425196319164f61f5ba81a2a63
SHA25652b8eb1589a23fccc23843b5142a42561a704d05b8fc7d1a184e1dc08daef0b1
SHA512ebb017722ae0ef93d093163da4e0d22b9d06d8c8a74510f967be57859b37f25f3dccb366c2bdb130350fa6dfd5491635a8d793ce9195a74b42ad31c33c8d1033
-
Filesize
6KB
MD5d5afeba90b114bc2125ed6ed97abf794
SHA1f120fb3c14c3ce3bc35b2d4007605b8e3b8d464b
SHA256f8c274308e48a116635a8a1b5a64ba7bbd056e4e954489d93469e02caed6317f
SHA51212a6e863ccbf44c987d55b38f080b156d414d6d848c8db39905ebe807c62c36a842b7e9ca531f2c1bfe07b18775a27d512b2c11373bd3ab3b102688815371ea3
-
Filesize
6KB
MD5347a25a28265f1c8f000a8efe63baac8
SHA1aa0935164218e285f2aa426e90b81d130c7099e6
SHA25607fddace02302c1804ce1f4c2bc3d4a602d98a2a38520f1221ed8c5e3606dc11
SHA512b0d9bd707954f393b85f948324fdd0ca025e2d293ab9556186c1645aee3accefac17f781cf17237f02499b1e18d44dfa12edfa51e4066106f0c9a9547ce151ab
-
Filesize
7KB
MD5f4bf2f1be4fbbc50dd2050014f455f76
SHA1254434c9bcd06127bdc55977ab9289793c07059d
SHA256724c4d26f370030e93987307bed93db61d2c0b6ea7bcb2bb6c380f23a3544fe9
SHA51246c4196263c95645aa86860343a81d08d0164416bd7124075462b113ae03f3b0624eadb413095f095dcbb2d0f44b8f97fc151ae50068c6530b04dcccd35ae50a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD546b76f715600d60cc7857a8e20063943
SHA1657d40a69b80517ec38dfb87735555064f049197
SHA256ee690e30e490dbaea50aae4be1bdbf69df532cf7c41062fec0defd53ccc8212b
SHA512ef2a31fd969977161759e45d5a25308a3f4d56598e52f9a5becee462c2418eb77e16602906a4e10e2dbbefe60a695b1047a8e5c37377ae81f9bbdfc1db1f2f81