Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 07:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bellevuecleaners-my.sharepoint.com/:b:/g/personal/bd_bellevuelondon_com/EVRrSfjO6WBHh0FZeObydM4BI9vBw2yxRqr0auW2RYgS9w?e=MxsWLS
Resource
win10v2004-20240426-en
General
-
Target
https://bellevuecleaners-my.sharepoint.com/:b:/g/personal/bd_bellevuelondon_com/EVRrSfjO6WBHh0FZeObydM4BI9vBw2yxRqr0auW2RYgS9w?e=MxsWLS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3424 msedge.exe 3424 msedge.exe 4440 msedge.exe 4440 msedge.exe 4748 identity_helper.exe 4748 identity_helper.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 2812 4440 msedge.exe 82 PID 4440 wrote to memory of 2812 4440 msedge.exe 82 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 4156 4440 msedge.exe 83 PID 4440 wrote to memory of 3424 4440 msedge.exe 84 PID 4440 wrote to memory of 3424 4440 msedge.exe 84 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85 PID 4440 wrote to memory of 4408 4440 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bellevuecleaners-my.sharepoint.com/:b:/g/personal/bd_bellevuelondon_com/EVRrSfjO6WBHh0FZeObydM4BI9vBw2yxRqr0auW2RYgS9w?e=MxsWLS1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec5a346f8,0x7ffec5a34708,0x7ffec5a347182⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7564815952116639112,5599496805981139174,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5d3b1dccff0015849eb2f176cf869159b
SHA1f56c57d602e2dc32eb74fdcd52ed8ce8c6412bc8
SHA25607466506f0032e8900b8985ae7584fe66d2b3771fa8c1b8a8a949dc5ea936e6d
SHA512fc5d9632c81e20cd3fccfe4550010ce5bbc6d9d85f2b654cc27eadbc1000cd43959ca79c50c7cfdb5968c42c7451ca0bb3231fe259de34a91011a097eaea39db
-
Filesize
438B
MD5ee834636b50e80110cac52bf1e5d0eee
SHA1ee19d1d40440b34d2742f243b27796c32acf2128
SHA2564a9c3c4da38f342b0513836ac164e70ac5bea75ef6b6e5e5c189187f90c6e848
SHA51263e9c2455e8b0d2a6f42a907dd42ef312999fe2a64e4d80e2147f41288cf27cf6c1e1ff3ff32ffb819e4e7de464b8b6a7d3565777dd02c161a66a90c7a91392d
-
Filesize
6KB
MD57d35fc1c2bc63da47a6da461b212a2c7
SHA1ab3ea6b1d4a4d9d29c6e83f8a210477833936fb2
SHA2566883a949533e8b43cf6fb6b0c97aed42f69532648cded70e1a953ec9034e955d
SHA5123ab651c13b07c9471fefbcd07d35c79692b0bf6a816616f159df1a9ae3589ba93b0459880d3d4afcb8a3cf8f605b093f4a400fb258bd7f636f9b8bc6debf0ca6
-
Filesize
6KB
MD51c84e32392b9cfe6311371ed04dd6f5e
SHA1b895e6bf23ebdc47bfe8f30f84162978c43fd732
SHA2562dac730ef8bf4dab27bd75b394ac4c67d16a2ba1ec5432552cf6571632759890
SHA51277d2d74f361f72ec408e50cffb60ab7ff1ab88aeda11a64f59cf0b98bd2a7e365c89dba67b89dd118fe3cf3c7954f20ab554e7ed7e46556e5f46ef5ba64e3d87
-
Filesize
6KB
MD529d2d682866ec85f0eb9c9ce0336a6c2
SHA164f09dd13aa63be5839e40eface78c081de049c5
SHA256d2b4f873c3422cc67aa9a1f0a732b0a3dbb16dd8294ef4797150de68e6e5f2ce
SHA512dfb6fd433b04e3d9ba69361f918860b62f530061e6be8f730385c2f5ee94dacc592ed28faac7995e6ed712210d09f27474f2efd7256ce20f4db224da146d7592
-
Filesize
706B
MD5a43ddfdc43890171a1db755bda445840
SHA13e50a6cbee91aed73d9d17be3c7ea8242732dd79
SHA25657e079773a671376c71aeffb75ebe9ec5efe7a6add9449c567b4976421d63b76
SHA512c2498486ba23a6676d8e3f18e76acddf70b2c2ce6443ea5eb22b5800331b156836ed9fbf5b41e408e0f49700b31571d038ebeaac4b3af9db8044d63a92f5e517
-
Filesize
369B
MD53d8a0eaadcb29de0b17f735d51769abc
SHA1c2f14ad01a970a1d0ff311547163d552540e58c8
SHA256003189519966a3abe93c73dda9b86d3e3ac848668e311691467409b3605488d7
SHA5120fcead4f89ac72cac0edfa5edb8c31ff5c4aa2ff59681a7d063871fb6d39c4523436133b4c56e2897130fee175c58aa17a69174c727d911b264cf8c087f08275
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54fe52ee98aa59a27a4abdafa70ae4ad3
SHA141ea6272039fed437b8d39c3534831fada800be9
SHA25655cb65ea605c7d3c1930538da660f0eb4a2ad4ee0379bc6490c57102bd1028ee
SHA512cdd26c157efbb3b69924892d0f100567d3c1d1e1d283df82590a5af64cbb8eb0400c1091f87a27027bfdf5200ab6d95ec00fecc3bc4786b89f092f97c741897c