Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 09:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://webmail.pcard.in
Resource
win10v2004-20240426-en
General
-
Target
http://webmail.pcard.in
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 3892 identity_helper.exe 3892 identity_helper.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 324 1840 msedge.exe 83 PID 1840 wrote to memory of 324 1840 msedge.exe 83 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 3336 1840 msedge.exe 85 PID 1840 wrote to memory of 4712 1840 msedge.exe 86 PID 1840 wrote to memory of 4712 1840 msedge.exe 86 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87 PID 1840 wrote to memory of 4156 1840 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://webmail.pcard.in1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7e4646f8,0x7ffe7e464708,0x7ffe7e4647182⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1476351146690479170,3070642665988251743,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD572b74aac701e9dee4bdc587efc51fe9f
SHA185ee8a830c80f21922f8cb3c1920aa883c849b58
SHA256a5bf0813c47cb2f8e1b961532132c563d99521e4ecfb6f0104588a5d3ad41868
SHA512144d6442c5be4a33b77aeb3550a86bf43f5a3b32045abec72c27e043b175997bb7c573a453ad3657cf1f35bb8e372ffc8dc9e96b4429aa318380a33653e0b018
-
Filesize
821B
MD5db3d8868e4e24501e3db861b6ebc2025
SHA167ee278b873915b4400ff649116f5dea3158e05e
SHA2565e5b93db079f8637a7e86e6bfa78f81f0bf819f7564c560ace8755a01b692b08
SHA51214cc5038bbc033c6fad0f348d6c7d174a65376def926a49bf44bc7f1f3c4ccc6ea94a3bc10b8c25c7ba84c93d29bf7e90e4b9a768c09466389cfe7c0fa86f066
-
Filesize
5KB
MD530e7058d36928c0f4c16019b5aa9c3d2
SHA1d62c266e6e246acb7f38a13af92b4eb30de11f2a
SHA25681d737f45c2de6325f4d9656ac63954d33a72f4f4f8de284c9fd91ae16f871bf
SHA5120ea7823de923bdd6925a29d392df2cab21e1defa555f9320648812e94a39ac8d82a8e0914367b60dd8340db44c5e999b44c09fba23e909cab61ecf31d49f66cc
-
Filesize
6KB
MD54157e254c68d3f55b2e3061e83023631
SHA1c8afddc87cba6f33cdb98431e2f093afd1ce5b96
SHA256cc8b55fa67a1d6f643bd9f661657971030d9f295bf099ac031818d3fcbaea1cf
SHA512a5cd3f9b4681b49017e9e0c757eef305d0baeb9afe453cf33af7934eb330954d7efd3beb7c132f59ec025abd4e0fef4ea8cfac59b1d9ce05b56a20da3fe8bd58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a3162382dfff80777cc158359292b3b6
SHA17ef8d17ce519c827c2944b86f09a3a0246d05207
SHA256b006f614e3c93c014f3dd1782e4fb2bc48341a763a5dc1e41f89244ca18bdb93
SHA51220cd73817ae0f8dd1b6f3de8b660c101150a19d5d156b57e5d494684355401e874bab6870ec0c1f74ac09bad93077616d00d887485a4652a32eeca971398d395