Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 07:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://webshop.verpakkingendegroof.be
Resource
win10v2004-20240508-en
General
-
Target
http://webshop.verpakkingendegroof.be
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 3316 msedge.exe 3316 msedge.exe 3932 identity_helper.exe 3932 identity_helper.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3316 wrote to memory of 3240 3316 msedge.exe 84 PID 3316 wrote to memory of 3240 3316 msedge.exe 84 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1160 3316 msedge.exe 85 PID 3316 wrote to memory of 1176 3316 msedge.exe 86 PID 3316 wrote to memory of 1176 3316 msedge.exe 86 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87 PID 3316 wrote to memory of 2832 3316 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://webshop.verpakkingendegroof.be1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d9546f8,0x7ff97d954708,0x7ff97d9547182⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,15399554670508152874,17000261646524894158,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD596b8fa098776ed2ae5cd699133111dd0
SHA1e20266d20193dc02db9f610a2ed12bd9a4b0303e
SHA25668bef9a2b1488529d02785bad906226fcdff0a960643589f823f106488eee7af
SHA512e2b287175eba142075ea289a830b3da037b071d3b5081bcfe7a20ff4564204a7bd3a88acd030b3d37d64f10c37980cc845cca6de44959304c6002536cc06a53a
-
Filesize
596B
MD50b3e1cb8d45c61a981ac6d899acafb1a
SHA1ec5ce6c226c24b618d111cf443b520ae79612cc4
SHA256620c90689efa11089e9f59928ba3fe420f8c3a804000bc8f265b2c4878cceca8
SHA5127947d1e6b857ec1565faae98411c37c23c65ee2a2ad8f9d432f1713efeaf5d0a835677ab61fcf16f192185f719bb60066bb74a2d16f53821f309bf5d15b12345
-
Filesize
5KB
MD5158eaa93f5416fd129747cd64e53e26c
SHA118ac7ad1fbab7a91ce823214cecefa2617386513
SHA256d665c8bfee21f546adf520db930e158821d1ab2512d1297deeadbd853ecc15ee
SHA512317e867b3115efc241e1e363825df722652049b633d24a12951c760635ccdf9b2b95c1f778d66b47dd994a414e6eb76bac3a6a5255de6a5a7c5a4bebbbf33be4
-
Filesize
6KB
MD5e9063b25172e60856423ee276ec9d4be
SHA1912768bb38686243d6e30730df2ef6cfb72585bd
SHA2561ef1004a502cd7f0c6accac9cb6e8a7691eb2f50cd289b8c9a0a36285fe03703
SHA512eb2140fdab06a770d2eb2536f9109b377ebf485db77990fc742b0d7701d0083229c64f7e472b54940672340c9312044d759730a4508a615e5d8fc712a98757fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58110fd9bf5d991fa25735fa31c2ebf0b
SHA11b72ad16826658e5f2e5cf22b6c9021ded2ea994
SHA256e080eec67cb5e4fe348a580443740807a30458afb0831a371cce7a59fbada236
SHA5121aaee41fe256244f2c2798861739ad366d97f7b3c7f3970f2d0cf3f09cad006134742e4c8f6716d2d9eb2368bc3208451fcbcee53ef1d9e6463c64595e9b7811