Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 18:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://na3.docusign.net/Signing/EmailStart.aspx?a=a96141e3-fe6a-455b-8a2d-3e0bd5f34c29&acct=2b81e9d7-a056-4db6-a0ef-8e38e097c2ee&er=73b9ed64-8b18-4297-9ede-4ad3b94adc9c
Resource
win10v2004-20240508-en
General
-
Target
https://na3.docusign.net/Signing/EmailStart.aspx?a=a96141e3-fe6a-455b-8a2d-3e0bd5f34c29&acct=2b81e9d7-a056-4db6-a0ef-8e38e097c2ee&er=73b9ed64-8b18-4297-9ede-4ad3b94adc9c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 4304 msedge.exe 4304 msedge.exe 1384 identity_helper.exe 1384 identity_helper.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 3196 4304 msedge.exe 82 PID 4304 wrote to memory of 3196 4304 msedge.exe 82 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3852 4304 msedge.exe 84 PID 4304 wrote to memory of 3972 4304 msedge.exe 85 PID 4304 wrote to memory of 3972 4304 msedge.exe 85 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86 PID 4304 wrote to memory of 5004 4304 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://na3.docusign.net/Signing/EmailStart.aspx?a=a96141e3-fe6a-455b-8a2d-3e0bd5f34c29&acct=2b81e9d7-a056-4db6-a0ef-8e38e097c2ee&er=73b9ed64-8b18-4297-9ede-4ad3b94adc9c1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d5546f8,0x7ff97d554708,0x7ff97d5547182⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17324595131677366125,13400332535418737315,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5444 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5d19930c1fe9332cbd84d7edfa9316899
SHA10a23d1de33cc57afd44fbe0bc14d2692e46e6313
SHA2561fbd6d83736c42c984224a8f8c23de061ef8f253c3f2fa5156f27ff8dcd5b58d
SHA512ee87e5ba41d8ac13da10b77fc366c8c17608b35a8ace33d69a82b44e343a74fdb54f9d9222a5fc037205edf87643a2a0c63e911984bb128137b93a3b71a0e15d
-
Filesize
264B
MD5378dd4af355d869deba82b3ea3658a04
SHA142352b6d52d22f2cebdf52fd7ff7e53b1146eebb
SHA256df1ca0d90fdc93161f72c51150ad16d620aa3912e3c948e68080b0420272542b
SHA5122c52e904ecc11e14a831c8706f6c29eb8c6aaaf0e3ddd948c0da4ec39ee691bccb15dacb32528f83f60798739fc085ffe91b1c9fb0d26ec61286504a31abc7a7
-
Filesize
6KB
MD5624b47798c7e95f4b38a4bce651901f4
SHA1041073b580fcf718160ea0e23f5eb9349053d111
SHA2565c03133f85e79ea7d6f2dc3202d1e97035c63cd3b6f11180f4e5616e5ab2b4bb
SHA5125b6914c60d800d404fcfdb2df19098898e98a1e37d3364294647817bbf3815f99a19d12cbd99fe0aaac02b9b6d4fbc34912e37b645a21247016235c64d993756
-
Filesize
6KB
MD5d40d5e767775d426a747a5f99f5178dd
SHA16fd5466f704c46c7f7cb8d874e90811950c6fb06
SHA256126c8f20d7e05f213ff6cb5c731c7bcc4f75da8456e9cc962d5e6516726f4ead
SHA512e03f53036c386ebc6035a58705fa4b7a29472c8a0366d28dcc268fd0848d4f4a5835336cb61bda7e52b043db7a5af3629806fe6e450a47a869a4bfcc57ae3604
-
Filesize
6KB
MD5eb74a6f62adc268153309f6bd353fdbf
SHA154c2a1d915369cf980d56857f3b6adb68849bc5f
SHA256927cc1813e1cf62686c903e672760be3d10df771c2ac92105d2f94a9eba6b920
SHA512a73ff1c803791ee01227799833723163384296eb84faccd0168c7e6c35ad772747f9d6ad8550cbf5ee0752e221c8f6f40b6156fdb187d32e9cda9bb187808556
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5772052dd3f7b052083e6f7c81b8ed818
SHA16ecbbdb6b180812b16a8a100647ce3c66a8b58c8
SHA256ca1c9d8d1711f47e53fd8d26d8ac4df5cfcdcaa9d47045d8271e0c1c22e92a5b
SHA5129bbbb13ffebb18768169be4f72df86482bad7a10b4a6d400dc5c072a5086622d99a5747ce8d2d2958f53ce9517075f273397572737cea339397d02acff781745