Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 09:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://iasocare.de/
Resource
win10v2004-20240426-en
General
-
Target
https://iasocare.de/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 1236 msedge.exe 1236 msedge.exe 4480 identity_helper.exe 4480 identity_helper.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1436 1236 msedge.exe 85 PID 1236 wrote to memory of 1436 1236 msedge.exe 85 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 1684 1236 msedge.exe 86 PID 1236 wrote to memory of 4376 1236 msedge.exe 87 PID 1236 wrote to memory of 4376 1236 msedge.exe 87 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88 PID 1236 wrote to memory of 4808 1236 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iasocare.de/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffa597346f8,0x7ffa59734708,0x7ffa597347182⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1999311407869745321,18050355280233502030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize552B
MD52b6e6d753a980cf9c1ca0b02031684e2
SHA1c423e7ca2d38b53728493d2b89768ce1dac59823
SHA25615a8640aa3243217e2592299d1f8539c8ef32d6aa9ce0d0e277af656aadd7ca2
SHA512c757d1b3bc4227e6e54d11e1f66b2197ea91777ec241e2ff0006c1789ec2fd9a2d7670890971d6952104ae737d01cd0cfaca7b544272a4aa9bb99dbca5b9f84b
-
Filesize
595B
MD512fb16b9c64c03977069a4528788f3a1
SHA190935cd641aef395076370f588d94c2abe41684c
SHA256eff04a4b49bd35ad492c2224362a60dedcfdc93f569e28bcac6260c797bccfc5
SHA512212a73bd10afb7398e3cf4a63c9a8928608cbd32080f61ad2b53b91c6df1cedec68e116296d13e032c3605e83a1d9eb6f13630ff0f2977065c8e70a101bd6f28
-
Filesize
5KB
MD5b887127687da3a1b7e386fe6a7cac8fd
SHA141639107def820e1946069362432accdc7d79723
SHA2564d0fbb5a1f8bd7d343d137d309230a40d2ab4c790f7fd3a2a69d061bb5f50279
SHA5121064d4ab125b84c07e39060641cc78c251b1e8bb10683b1c6c7c85ec7027f104176c6b1aa987d69b36e4e740caf973bbbaeff6abbaf453d67c216615d552e42e
-
Filesize
6KB
MD5ed904c47abb6eb7c2a9784740c91370e
SHA1c52b6e5350dffd71dac0f5988904df163480cc5d
SHA256fcab87f21997e7db5d203cf81540f2e00003c39ac68ebc946ee16b13177abb7d
SHA512ec1f33cfafe83839bc1ceff421273bb406e15faecd8b924d371faa6d669f1e7e46cbc71863357f7f95b51e0a261aa2736d20ce0ea1c51d510d5689ed13b2ff33
-
Filesize
6KB
MD5c1d7b1b1b83cfddcaf88b7d80182fecb
SHA1b33848e77460d2d168f014de536981b0c7f91710
SHA25605241b26cd940e544d600d4aed2f92beaaf52713cf1b2f57aa2df0831c8affa5
SHA5122a4df2368462700e96c2e88448f6fd5f72cdee114ebe0508e3e961ea32753e1b731c4266219c11a0bcaf56ca99140c9741d5fd60012ed6c496cab1ec8e94231a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD589f9ab2c0aeba3abaacce77408956242
SHA1b578989971e397cedb24d3a56ab82a50757c4539
SHA256214ed69fe7405292361b6cf41e1c30eef07e46213af68baf45ae76c1cb640bc3
SHA512d7e02ae308273b6112892d5b28c942264d1a6277509f5a98d252e88d32b3b460ad782d7b794788746e102f948a71cc1d38033e451bcbc6dbd49d1329e8d0e1bd