Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 20:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://paladium-pvp.fr
Resource
win10v2004-20240508-en
General
-
Target
http://paladium-pvp.fr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 2672 msedge.exe 2672 msedge.exe 1176 identity_helper.exe 1176 identity_helper.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe 5304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2620 2672 msedge.exe 83 PID 2672 wrote to memory of 2620 2672 msedge.exe 83 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 3824 2672 msedge.exe 84 PID 2672 wrote to memory of 4908 2672 msedge.exe 85 PID 2672 wrote to memory of 4908 2672 msedge.exe 85 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86 PID 2672 wrote to memory of 4656 2672 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://paladium-pvp.fr1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fe9b46f8,0x7ff8fe9b4708,0x7ff8fe9b47182⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3192 /prefetch:82⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17287654030755665091,15011205994521535892,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD525b36ddb9a12d32b669bc4f90e1d06f4
SHA1c8df1816954640c5468f6d7f29fd0ff3a4880d3a
SHA25625784eee54ec79a298ac3dcef48a093cefefc5db04988f43990dbdc7e2b62cdf
SHA512e24523da930a2267f5954286e5368aff584677aa8edc3fc3dfe3488cc5cdaf78132bb9a7dbfe21435aefcaf767b1de28fdc64575753c26bd30035e7fd1d0557b
-
Filesize
665B
MD5ac73da2e9c3fae8fc326ec63b408499e
SHA10b7a5774d7611fda4e5c4b9bdb089b936bea207c
SHA256e608d664fa4de90aa7abda50e577c2e40a81fd84e9e0274e0e496d77a96cb3ee
SHA512cbbabae6d3910966b3241b4a095614c7098eda5a2f794a7ccebccd77d28f97771acd03a188ec787e99d6f1077c6a12c0cbfa2fada82df3170d897d994593b42d
-
Filesize
5KB
MD52c1b6e46e8614f27633a2d3f7b9f5669
SHA1560d672b6f1623306feee07dd0853d0d0d993a6e
SHA25686cf5d60aa463d47913fd29170b9c0bd2b0fc0adbfdfba0c004e4e12654cd531
SHA512dd06da5f3df43f922c7aa4009ee3547064d20d0764ff48fca68d40f1433e94077f2e26a1a866838a3a3d6928876b726bb1c8b45e777ceb17b6903e331239250b
-
Filesize
6KB
MD57500db04e0af39ecaaf8c39d8c48a11c
SHA189028adeb398894ec5edec31f127664ec0b776c3
SHA2563d807e48c673f3d2716271ba63c9ff47e5fb81721dc4a7c8623394586a1c2a60
SHA512e961d4ce4a12181d04aa75400431dfe129f8ff4cc1103229cb3206739c480a5980bb296af7a7de4a0d2b6a988e6b600fb5bbd7bb77a0a50b7b70e54a27c09b68
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5342115b4b2f0905cf3d9f9a96d144150
SHA1c2a8b5cdcff578bb54266d11252e52b9ee1a8381
SHA2565f7d8b6f17658aec7d1ecbe11f22c3f08b2e38730f5fd94a259bb706b397d663
SHA512bb86ee25b5d8525df3dc7bb3df0ecfa87e5862bb4ecff48044306203f7444144e4c73db6fdc0d106aff6e8e75e9ea34d3134aee175c5e887889aef938d3cb88e