Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-05-2024 00:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://haouzi.store/02flix/page_settings/login.php
Resource
win11-20240508-en
General
-
Target
https://haouzi.store/02flix/page_settings/login.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid process 2480 msedge.exe 2480 msedge.exe 4268 msedge.exe 4268 msedge.exe 3972 identity_helper.exe 3972 identity_helper.exe 5048 msedge.exe 5048 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4268 wrote to memory of 2924 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2924 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2596 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2480 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 2480 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe PID 4268 wrote to memory of 4564 4268 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://haouzi.store/02flix/page_settings/login.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8c1043cb8,0x7ff8c1043cc8,0x7ff8c1043cd82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2508 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,15063268468236814936,9507075458655735062,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5644 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e4bf11ed97b6b312e938ca216cf30e
SHA1ff6b0b475e552dc08a2c81c9eb9230821d3c8290
SHA256296db8c9361efb62e23be1935fd172cfe9fbcd89a424f34f347ec3cc5ca5afad
SHA512ce1a05df2619af419ed3058dcbd7254c7159d333356d9f1d5e2591c19e17ab0ac9b6d3e625e36246ad187256bee75b7011370220ef127c4f1171879014d0dd76
-
Filesize
152B
MD523da8c216a7633c78c347cc80603cd99
SHA1a378873c9d3484e0c57c1cb6c6895f34fee0ea61
SHA25603dbdb03799f9e37c38f6d9d498ad09f7f0f9901430ff69d95aa26cae87504d3
SHA512d34ae684e8462e3f2aba2260f2649dee01b4e2138b50283513c8c19c47faf039701854e1a9cbf21d7a20c28a6306f953b58ffb9144ead067f5f73650a759ff17
-
Filesize
5KB
MD5abd6d041cedcc97c6d8effdbba90c9bc
SHA1fc52dcfe7fbbc21cc45393a9bf1ae3faae416848
SHA256cc93eab9dc8f094c01bb89c46154e345f53f16fc0b0de3dc0299f747f812b029
SHA512304011e33442fd4ff0c61c8816b5437b8004302996dd77d051d601a88f7e2dc547404c4a2e72c820c3f6b69871eb19434a1bf3e51dbdea6249ad1d612e7f27a9
-
Filesize
5KB
MD5b8c14e2975718c580ae19d9e4c320bb9
SHA1f5a20bebbfd9df04858679f9682bd3283b43702e
SHA256a04864387fc0a4e27155059684a65ce23ac93dd5154604ea2804b823437c1d95
SHA5124369d9c2a81c84648c7a15f09fc0006254c004567488fcc2261abc8be41182b8c11e6b1d56c75c15dd194f7e9cdf0440c64dc9eb94a945705b1798ea9fc8ef9c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54c116214b589c06a570afac796640be1
SHA1ddb1589c8f7f8d1d7dc8d55ffc2fe505b74c6734
SHA2566744662f496d40790f431939fcaf5d9de1faf14323f186e08698f8ff530bd0c4
SHA5127e9874321deb2510fb5955e0bc6cc7e352f9274c315e1dddb905439d48a3ba7ed457d9a2f16b8b0826d6f212804f3b0b3f96a0328f48a579662f1dcc22927f59