Analysis
-
max time kernel
60s -
max time network
62s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-05-2024 14:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qcz.goc.mybluehost.me/wp-admin/js/widgets/backoffice/
Resource
win11-20240508-en
General
-
Target
https://qcz.goc.mybluehost.me/wp-admin/js/widgets/backoffice/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 3004 msedge.exe 3004 msedge.exe 5100 msedge.exe 5100 msedge.exe 3216 msedge.exe 3216 msedge.exe 3740 identity_helper.exe 3740 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5100 wrote to memory of 1072 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1072 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 2180 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 3004 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 3004 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe PID 5100 wrote to memory of 1624 5100 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://qcz.goc.mybluehost.me/wp-admin/js/widgets/backoffice/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda0103cb8,0x7ffda0103cc8,0x7ffda0103cd82⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,163031823220873024,4236529825267929061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e4bf11ed97b6b312e938ca216cf30e
SHA1ff6b0b475e552dc08a2c81c9eb9230821d3c8290
SHA256296db8c9361efb62e23be1935fd172cfe9fbcd89a424f34f347ec3cc5ca5afad
SHA512ce1a05df2619af419ed3058dcbd7254c7159d333356d9f1d5e2591c19e17ab0ac9b6d3e625e36246ad187256bee75b7011370220ef127c4f1171879014d0dd76
-
Filesize
152B
MD523da8c216a7633c78c347cc80603cd99
SHA1a378873c9d3484e0c57c1cb6c6895f34fee0ea61
SHA25603dbdb03799f9e37c38f6d9d498ad09f7f0f9901430ff69d95aa26cae87504d3
SHA512d34ae684e8462e3f2aba2260f2649dee01b4e2138b50283513c8c19c47faf039701854e1a9cbf21d7a20c28a6306f953b58ffb9144ead067f5f73650a759ff17
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5bedec75901d24e473c0aeea7cec39856
SHA12b610e56a84bfceaf7e943cf981f5b07086b57e3
SHA25612d16875fb0ff9e6586306dc9115bdc583b64063a39512f90936e2d1e6b29c41
SHA5128b8e86ced571fdaae0f77c0cbf05b11b016e796b7bb9e9d7570845d3692978843516cbd8fac40520693b0f156e15f48faf4bf7d829f1f41948477e35f6623f6b
-
Filesize
5KB
MD5774b6f328d32bcc364503dfd20e00c0b
SHA1ac9a38db4f821b2982c36aaf55a0bb625fc44b1a
SHA256a71658257ed5047c351a4b2f12dcd999678e3aaa417589780aafc4d3ac83f8fa
SHA51282a07afd0dc2be1540e4adbb0c97cc130f23ca59e16310cedcc1aecf8a26cafd2f661ae215c9d6f83df3bda161347974376fc879869b94ad7beec5e36b760f39
-
Filesize
6KB
MD5e359ea448ae0cb0850cfdce86d036e69
SHA167e8f6554b3921c1a8f63004e38e41fd6c1e0164
SHA256ddfeaa8482d3f4803c18ac32a25d5bcf459d4d100ace5442d6afa606c8aa8fb6
SHA5122c97b8cc0d75cf003c5d1fcd1b8f7797e2d6797fc01f6df7c5b2043a50aa5d3326a0e552f0858780b81991311a290eba14c2c6724432b5b510de904a2c108ecb
-
Filesize
6KB
MD520f856dd8002839eb1a6022578038a71
SHA1f1f5a3259c95e29d8b3d8fccf580a42581ea97f6
SHA256ddb370c0f68477e0a9d7d30d25b61b15ae2508a7f87a0bdc9240e0fd15fc0815
SHA5127366e748c9ede32d8dbcc3c9dd8a4b2f360bea236d216ea262a2d0f5831fc29c05eb1a9a9a59db53de7f330f9e761e6d1663b7482b94c9aeeb780cdd718311e5
-
Filesize
871B
MD5e283652bcc1c0a69ad3a132c9defdd57
SHA196f869ed7be27532edcc43f5842e065120560f33
SHA25690efce38345f345d5de7ece63bcf22af4e19d9e8232d6d36bfbdddd89b9667a6
SHA51233415ff79b613361441f1e8f980a2740ecdfcadf6b912eeeb38c9f1d4d8b0a223e2ecfa2e673a110006d46acf5bad24ad329e4b22c28a6b97385cffd43ca2eb0
-
Filesize
871B
MD57e86c0a3ced1a65012a7cce70509cb4f
SHA1124924d40ad10e437cbbe7af78911928dea16c1a
SHA2569f3ab28525cecc77f05ae69b7b546b928a8b6369d108ffc34d947ee8624fb2a3
SHA5127bcfb8193f0fd71556df5bc4f3d7e69530255c789c25d2e21faf205a2452d73e211822558468c1719a87fab2ac3cc3eb6b5739f906c115b6789cecb7bd96abfa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55ea6fcf6aaf44fa2ead4e00b6e1b3b05
SHA167af87c0d5f507d78340f188ead5144187b60be0
SHA256edb94e5bcefe76e9a5dd464f81406c7a38c103a905998cce6906397d616e6a78
SHA5124ac048a10a20e032c1b4dbeca74044e32d396ac84defac4f29cdb24dd30ff8ea5eba3996a317a6045b685b86e80c6c97c6b2d2f0e46e3694022e1b5f1363273f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e