Analysis
-
max time kernel
1680s -
max time network
1684s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 23:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://reviewplay.org
Resource
win10v2004-20240508-en
General
-
Target
http://reviewplay.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 4884 msedge.exe 4884 msedge.exe 3040 identity_helper.exe 3040 identity_helper.exe 6108 msedge.exe 6108 msedge.exe 6108 msedge.exe 6108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4884 wrote to memory of 1004 4884 msedge.exe 81 PID 4884 wrote to memory of 1004 4884 msedge.exe 81 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 4908 4884 msedge.exe 82 PID 4884 wrote to memory of 2992 4884 msedge.exe 83 PID 4884 wrote to memory of 2992 4884 msedge.exe 83 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84 PID 4884 wrote to memory of 2364 4884 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://reviewplay.org1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd168946f8,0x7ffd16894708,0x7ffd168947182⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,10058019612227146045,6983121248042880351,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD5d3bdaffaa329c5917948de459b36fc0c
SHA144f3b55214b578a94245741480cd37ff3f3a5363
SHA256e058cfde1a8ac377129ee78d5dd891c12f2406a36b450076084830886f1d548f
SHA512983f6a402ee146182f0a7a46f9af7930124b16d6c443f451536aee32eb907d3a01e826dcaeab3ea4cf0b583084ab0533812b19827b2d63895b924a0e3e56c8dc
-
Filesize
3KB
MD551357492e488812d27cad4f4166203d7
SHA144e66ed4d41e00cc8a3780e5d7577298a263fd77
SHA256e4d4e6213854aa708b7a08b474ce1ff60402a207ae8b6624ec40faf29929f36b
SHA512a08fb9e88aa32cfc9eb1558ae34ee76c6f5902f788966251aed8cab41b859c8e3656b7486029faf52e85f50d6dab7f029723fee59527e396e724d40684095b87
-
Filesize
5KB
MD564d1c3e788d66d905c69ccf7894c6705
SHA1f3a5ee78265e0b49f6427de60693a5b32401065e
SHA2568acc7b12207481ad9961b17dfc6c2d8aa82cef7dfce2c3e5ea336c72c73c9d98
SHA5121e08aff6687b343bee18e20e87ad097d13d5d106b06f1b8c1e356555618965add42cd2e4a188e6137ebd1ece51aad7d879f2736cd556fe69087712dbce739a1f
-
Filesize
7KB
MD52f30d7d75c8498d3434b108880a46e58
SHA19c5796b26547b3a7b8b7ed451463b7240bb7c8de
SHA256d52291b8b07ce113d5eebe4329a03ebe21f2dd450f1b84f4802d1109aaca821b
SHA51224d4c399969747758fbbd3d03a7c8bc2f3b753059155852c2e8dd26e3dc92ae939e1f0d13331f88385ce46dee911d6b7bd8ce82f821638f604ff9bf1391a9026
-
Filesize
703B
MD50d67aea91533b782c866521201260e4a
SHA1307d2f513f6a659bb28218fe6250564158064f78
SHA25631f99afa3e14a9ea5e6c8cc51b49adfcb766dd1a2e32be67e384587df5c939e4
SHA512614b59beca953221fb6e62de8e65b71752b16a0c4dd0f452a9e90a90ef79b6e37dfeb697f9c2159265de1d61595f0d34dc123628373d79d2747e414ea59f1060
-
Filesize
705B
MD57671a6b023e1b9e540fe22677ed33392
SHA131268c11db2b17c618fc1ac0ffc681f9801b5292
SHA2568bd961f38f1eaa9df01bc6a2ce0a7965ddfb086aeb94d467aca1f321b0e5d635
SHA5121c9a9dd0f22b2574941e63be1e9f713d2e89024b7ca9b1ac6a3198b910bf609a45087d167281a8ea4258a8c09afa82e5abec4f9957debd9110238ecfb7d62f93
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51f4132ca5b4d7f58f59cba88d4e03eba
SHA171d79f6ff662151d51f1c965e781377221d557e1
SHA2569a06050cf902c3188abbc5c6f906953791266362630fcc217516d39aee57f706
SHA51247a40df544fa2d77f95995dfd85d43c0f8e9eb1eb21605fd243fc9c4cfa832e922f1fc875324cb1c9526ee59df622f5186c8c6ab7a5cd4e4affbd03a27766cc5