Analysis
-
max time kernel
481s -
max time network
487s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 16:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://filecr.com/windows/adobe-premiere-pro-0039/?id=705659327000
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://filecr.com/windows/adobe-premiere-pro-0039/?id=705659327000
Resource
win10v2004-20240426-en
General
-
Target
https://filecr.com/windows/adobe-premiere-pro-0039/?id=705659327000
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 2380 msedge.exe 2380 msedge.exe 2860 identity_helper.exe 2860 identity_helper.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 216 2380 msedge.exe 83 PID 2380 wrote to memory of 216 2380 msedge.exe 83 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 1048 2380 msedge.exe 84 PID 2380 wrote to memory of 5004 2380 msedge.exe 85 PID 2380 wrote to memory of 5004 2380 msedge.exe 85 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86 PID 2380 wrote to memory of 1652 2380 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://filecr.com/windows/adobe-premiere-pro-0039/?id=7056593270001⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb31e746f8,0x7ffb31e74708,0x7ffb31e747182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6999654117549140466,6648287917278304304,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5ca3e71c878763abff4139fa5fbd416e4
SHA1cdd4a5e9a73e39812ef35aa698a3b9e6e7252547
SHA2568f69ecac3b3983bda2c83884a91be9246fb45305dafe12bbb96b05e45cf14de2
SHA51288be7bb8e6c2616cedfd457554bcc6db7f3847ee64d2a783e259c4e3433e60fac2bad25c87dbcac4dbbb61ebb904c62e8e4235db1b9a4a35b3557477424fdd59
-
Filesize
315B
MD5edc8373599611ed0fd4b6650293e6d1c
SHA1b904297a81e90b644c445613091eabecc46f726e
SHA256a33d68eeca8bbb190900a961267134c5f5edfff94f62f7813a0f2572be6be8a1
SHA51256f1d66f1a112a3b333b910eb78b0ebb5bf8b3af31ab1b63d317242268adfa6969cd67ffda4f95064dc9acdeef547ed9ee4399dafc70b280bb18eb1d22fdf895
-
Filesize
5KB
MD552b6601f8aec96d33ff15670b36ccbaf
SHA1736d8cee645b9de97989cd94bfc57896ea328fcf
SHA256b86476dd00108f0bdfdef76c325fbf39e7e36660525ce6d2780a2f2c2e51cb58
SHA5129953573377c1353826a216b172d659f4569197d35270c2283817f1f5c66ce58b7f46f79f3028340fa1841582162778a912cc7b0946e722d02327e47deee59ae4
-
Filesize
6KB
MD55a0bbac3a090c0df3625ac1104cf16eb
SHA1a9137a41c0c42e5e275e17d0de2c5b88f3c3fbdd
SHA2567bff3a925f857dcac2006ae8331bd195f896664e2bbc2c73b40a958b4edf5ac5
SHA512e54820e02282e9c5a6294ff652fe3e192c5febabcd3c01a5ffc982be78b7801f8ce966a0957ad55700eaef8603679d65e4a59e63c012a19d08afd7d165a92475
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
20KB
MD5e8e1f8273c10625d8b5e1541f8cab8fd
SHA118d7a3b3362fc592407e5b174a8fb60a128ce544
SHA25645870d39eb491375c12251d35194e916ace795b1a67e02841e1bbcb14f1a0e44
SHA512ca77d40ec247d16bc50302f8b13c79b37ab1fcf81c1f8ab50f2fc5430d4fabc74f5845c781bd11bb55840184e6765c2f18b28af72e1f7800fe0bb0b1f3f23b24
-
Filesize
11KB
MD59545c1be3dfbac1c5a5dba3509680965
SHA192c88411eea808ae989f84a46354fa5b2f7c2850
SHA256d85792a273fec0142764e363b8fa53a59e4d0d67320dbc5b2d5c550addc78ee6
SHA51234a850e99f7bc426cb3bd2a1e7521b5912c3194e33e34ee90d720eb59a37f9911ff8411804500c4ee4de8734d2648d231b6a84c9e2b82e4c49660f81ebf6144e