Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 16:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://doc-48.jimdosite.com
Resource
win10v2004-20240508-en
General
-
Target
https://doc-48.jimdosite.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 4864 msedge.exe 4864 msedge.exe 4448 identity_helper.exe 4448 identity_helper.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe 692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4824 4864 msedge.exe 82 PID 4864 wrote to memory of 4824 4864 msedge.exe 82 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 3048 4864 msedge.exe 83 PID 4864 wrote to memory of 1624 4864 msedge.exe 84 PID 4864 wrote to memory of 1624 4864 msedge.exe 84 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85 PID 4864 wrote to memory of 4844 4864 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://doc-48.jimdosite.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe92d846f8,0x7ffe92d84708,0x7ffe92d847182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1923924577711881582,13120509561133506826,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5df69f348fc5b8bc4f21ef36ac8863585
SHA18f79456b6d97c5aea5a8c5e0c62af918ffa785e3
SHA256dd66a56edea45ede87e020c645b5764330827996c42b9a8bea256b606d79a204
SHA5125e0e318ff2b1c7cda125b83d863839d9e18cf306e91ffef4bc73892ba08b1da6b5d7a4c25103e650aa0571cb35ce4e0b6fa8b4cc0c4fbc29f795575ed6907040
-
Filesize
831B
MD552d6aa111f21a887c0b29dd3d9eeb60a
SHA1ce32591057535d687387b833b73584fb9845bd38
SHA256b01ac80b5d2e1ff56df6d568f7a2674de694fc1615839d694132514ddcaa702d
SHA512bbc2d13045ed4e1d7fa492a8fb9302d2c3c62d86268a5e8c7d777951c942c61f203a58f656cb3a68b3e571c7ea539f0fa4dc5c827e8e567530f5946e280642b6
-
Filesize
6KB
MD5860950dcd241ab94b63604641003a846
SHA130a07dca9a4bb90a696bc03a642db23fc22f656d
SHA2564ae14f46de80bc4c4cc41e5926df4f22358b718f5aedd79483c1691a19badf04
SHA512ef25e972f409083786b145e31e004509a51fcaa9314ea126ddf22f32ec476135e8081702933df52819b21f7ecc315f35fbf6c49a1e208af81605de25fceafc4f
-
Filesize
6KB
MD59dbdc946d8778b7f520f6adeb9358bd7
SHA1719167f9c0f8e85f01e5c6c9173bd637655b1f49
SHA256528c559a8326f185260a60fd3a62f49a464b1ad77f3f9ad90ecd2a2b684c691f
SHA51200b01cfb7a1953b68d0321212a662a481f351104b7738f6fe20e7d22b548ee2f4da80f83ceada75ba7bbb0c39d679f77544c19e96c0e99aa55278b06064a7060
-
Filesize
6KB
MD5b78db7eaf747f23fef6b8cf5b45a5264
SHA19cf923c1dad30fd08634ad1cf7a5ceb5ccaa43e9
SHA2564660d510cb5b5c23376f129bbdaf0cfea8782bc66cb80437f4af61c31498d4f8
SHA512b73870edbfec6004dcfeceb17bc13e86a5f084227c12bba0a2c419890727501f8a26b909daee0e58f87440d68fa5fcbf0ac7521e14d6e94b74658d686179fdb4
-
Filesize
534B
MD54f323947e7dcf3d96b23ac0a5ad18ffa
SHA139ee9b6be88ef74274c1cd90e7573ab327d4b291
SHA2566e1cace5af705ad2d7540d32d12ec5c285857a1fdeda23bfb6dcbbeb6d5679be
SHA512dc627f037262710a64835155fbc5dcc48293f9fc50d710b3dbca582af2465b469fbc347045fb86e0953a1000c5b720a6464b54122ef0e3f7c287ae1960c3c3bc
-
Filesize
534B
MD53ca04ee46decd0a2d5a6d519503f3464
SHA1e5d7dcb9e0d2f0647c37d1ac1953bafc4721f2bc
SHA256e8ac9eba1ac85b6ca51959b03ecf62692d2cb476025113078f09c08830c5502d
SHA5126255479a4299d10ef3f8fbbf9ccf2b54bdf9ac0374d0e57a577767e721873c9eb18ee56d03cd7fcbc1cb37e0c4f1d00901e7e20d3557a7381c56184064920d45
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d45ef5979ffbccbdd3917e594d5cfe30
SHA17d46ef9e352165bf0aa711eeeb1025746983a7cd
SHA256128205d00f9bd5ad6da1e9a20d53159e6c94f6bffc14fbcc65c8cd7f6c799785
SHA512335e7ae37f2cff50aed636bb9189e5a0548d18d001971f9f08f569d1e903aaa7e3939970d7e0432994dc475903e35979826a93704242eaa0c4b87cba4ca16583