Analysis
-
max time kernel
145s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 18:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.gofundme.com/f/support-cindy-during-her-fight-against-cancer
Resource
win10v2004-20240426-en
General
-
Target
https://www.gofundme.com/f/support-cindy-during-her-fight-against-cancer
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2200 msedge.exe 2200 msedge.exe 4560 msedge.exe 4560 msedge.exe 3436 identity_helper.exe 3436 identity_helper.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4560 wrote to memory of 2352 4560 msedge.exe 82 PID 4560 wrote to memory of 2352 4560 msedge.exe 82 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 4956 4560 msedge.exe 84 PID 4560 wrote to memory of 2200 4560 msedge.exe 85 PID 4560 wrote to memory of 2200 4560 msedge.exe 85 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86 PID 4560 wrote to memory of 3920 4560 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.gofundme.com/f/support-cindy-during-her-fight-against-cancer1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e2e46f8,0x7ffd5e2e4708,0x7ffd5e2e47182⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3958202128765187416,15934052936145213904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD571dbb388574a85204096a734b3c232a1
SHA12389ca55c8baf32d56af9785d4b2c63e4294e724
SHA2562048b8db131f17fb3759e85731b1dac2362494646a6bfa6cb739d93807aa93d6
SHA5120960dc308e94d47c15b8e8f9602824b3a2c14cd5685c80766e68f455e1ce1cabbdd7fa9bea91e550a9bcb80c25fc533ada7b037f1b0e40fdaf38bd64b0b2dce5
-
Filesize
1KB
MD50ebd66851740b4ae4c09dfa254869e21
SHA1875798df7781988b69946963689d00c7d1f9b7df
SHA256e80c813e4d69fbc955b91b7f675e4b860306fa15cac0260173039d66a08ed176
SHA512d24599a0b1a496a3d30fd8981ab0ed21830dae70f0b5b821bf599eb7699e89a92655e29e951ec4cd97c5a8d6b9fc4baec12ce2ce9c660682d31e9872330e2254
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD58e0a32b0133c7d720821fb73794c739c
SHA1bdd093d822b6dfe82b6e8e05147b639f46118041
SHA2560418a6a96474cb5202147559d9aa67dc8dba8a8347fe48dfb2a109a9ada83359
SHA512d0bfa7705cabf225a9391b6c38eaffbb9cf4aedc8491373645d4082456877b48bd5010331d5412e50a19071dd34941ead72c8943a31516315e1c8478424c38e2
-
Filesize
6KB
MD5483619dacf2636dceaa8c14fc8285209
SHA144d4eed3078fcc1dd0630316674c2d26561671ec
SHA2562f2cb7dd01f43fe52e4244769bd91f89394b9eeb45b96f64ab3ecb0d11c9cfa7
SHA51205bca087f737be6229aab118002a8b61633596f63d6e8ad656648af72d3d82a0c9a8ffdc330113ada889bdd9e5d2c1320e33fe176b8300b984e2f88aaf6e19f3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57f2217e1899b526795f0f7b243b0b8b0
SHA1fd43146126a2b179463bd23e1b5b464fcafbf0da
SHA256d7c54a71c940b3514953e176f5301ee4dd71a56875369257eff9abfb0654da1d
SHA5127e0ff62a6e903a7f56057a23b7ccc6adcc0bfe0072c06fae15c0af81fa5beed9a1547e33e1b784631e5419ecd5900f2062e3589973445418cb6846f92a9bc918