Analysis
-
max time kernel
262s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 14:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://na2.docusign.net/signing/emails/v1-9cbe067036304041a75a0f8c5dd4d26d8a22a339fb5a4dec9d900a2782f00e28
Resource
win10v2004-20240426-en
General
-
Target
https://na2.docusign.net/signing/emails/v1-9cbe067036304041a75a0f8c5dd4d26d8a22a339fb5a4dec9d900a2782f00e28
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 212 msedge.exe 212 msedge.exe 4320 identity_helper.exe 4320 identity_helper.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 3932 212 msedge.exe 84 PID 212 wrote to memory of 3932 212 msedge.exe 84 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 3028 212 msedge.exe 85 PID 212 wrote to memory of 4484 212 msedge.exe 86 PID 212 wrote to memory of 4484 212 msedge.exe 86 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87 PID 212 wrote to memory of 4396 212 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://na2.docusign.net/signing/emails/v1-9cbe067036304041a75a0f8c5dd4d26d8a22a339fb5a4dec9d900a2782f00e281⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9e7046f8,0x7ffa9e704708,0x7ffa9e7047182⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5035707820744180322,4302886346269868064,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD50cdf117fb219135b81e3bf7d0c409820
SHA19b2af6c8a21a18fecc221d4b8391d55331d3ebc2
SHA256438e2f2015cc971eec1cd231c5673bcb590174b8852eaebc33b037843a379ecb
SHA512537de2f6100df6a5c76341c24c67146c9c6bd58ccc4a602948e01e58c57907f1876a9746ddc755f5c4b0461585bc35657585e419c56e707ca564528c3403aa3b
-
Filesize
264B
MD5378dd4af355d869deba82b3ea3658a04
SHA142352b6d52d22f2cebdf52fd7ff7e53b1146eebb
SHA256df1ca0d90fdc93161f72c51150ad16d620aa3912e3c948e68080b0420272542b
SHA5122c52e904ecc11e14a831c8706f6c29eb8c6aaaf0e3ddd948c0da4ec39ee691bccb15dacb32528f83f60798739fc085ffe91b1c9fb0d26ec61286504a31abc7a7
-
Filesize
6KB
MD545e7a1f9641c3ff1c6ada91e218708ba
SHA111c14fb2b45f30afb2d33107075eede94430bb36
SHA25688e3fab866f4b40dade6c4190ae8f4a6346164e766d69ddae1a3770804faf451
SHA5121753f11db25b9b7e06bd29211a5e3f3ea726b533d48f2e1df12b932f04959d92170f6c6a20706791b7147118b7564ecfa2760bfcac1f4efce55f3619d474a351
-
Filesize
5KB
MD5891436d3a2406c1805a7bf44167c4c3e
SHA1c3e84b675cb379ac2fbf96a92b1bcbd4c4dd37e0
SHA25631c004faf63c562f639f8b0d6ee3dfea8f60af3a36ded221b668911a42514525
SHA512bb59d9614c2e054dfd5ec97335790ea320e5d0cba6431bb1815d0213e3edd8b4764fafc08e4fb723acfd520da9dd525303b1c6bade183418ac1c4f951b0b059b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5603a1f5747037a3a582062b66f3292bd
SHA1ff702395d72f345fb80cd9126a7aa5cddc8304a7
SHA25695a1e9d7828e4415aafe4895a2acf692d2f3518f5fda10c14927d631e1293610
SHA5125f330fd12df9def68866397aa7334346bcde7c186818e5000192b9907b2ba961b0e44ac3be7f507d2a63adfda8e14ae37a82e1a5b4ed8cb2b48f595606d97049