Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 13:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url.uk.m.mimecastprotect.com/s/8Ei0C5RA5COKxx8HzfOxU?domain=awrostamani.com
Resource
win10v2004-20240508-en
General
-
Target
https://url.uk.m.mimecastprotect.com/s/8Ei0C5RA5COKxx8HzfOxU?domain=awrostamani.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 1416 msedge.exe 1416 msedge.exe 988 identity_helper.exe 988 identity_helper.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2068 1416 msedge.exe 83 PID 1416 wrote to memory of 2068 1416 msedge.exe 83 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 5008 1416 msedge.exe 84 PID 1416 wrote to memory of 4168 1416 msedge.exe 85 PID 1416 wrote to memory of 4168 1416 msedge.exe 85 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86 PID 1416 wrote to memory of 2444 1416 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://url.uk.m.mimecastprotect.com/s/8Ei0C5RA5COKxx8HzfOxU?domain=awrostamani.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a47946f8,0x7ff8a4794708,0x7ff8a47947182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,4318806611663890983,13482580853627510862,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
1024KB
MD56c5090327ed7c8305cb95ae4ecc57cb1
SHA1960090fca307edd2dc405051fecb87c6966c5d77
SHA2563c895c608f0bebf9c158fb81490d85309fcb63318ccac418931d497fb7e0e66a
SHA5129c173179cabf53cd41362d606460094cebc2418e1748a29e501e0391eb4bea866421e2a66eb024abd86c414ba3e7b6f956400996fba8ea79d0a63f41ef5cd62c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD5c89fa9a1461e3fe8d3c6800edf092de6
SHA16505e248fa0c02bf9e19d7d1714f4c6c2af904ff
SHA2562a23b2bb95f3d6c3fd4645d04ac9a5caa512b0a1bacbf1216b5072b5a109d257
SHA512f3eef47671d3e9e10460e0dda3ab6300adf98d19713afa2a02cd2f97ede56d575302904ffb85c74f012ff7f6febcb905013a1b3568b5433803b57cb419b5a5fa
-
Filesize
1KB
MD507b905fcf44ff2d393afbc9c6ca2c4b8
SHA1e0ad8c09229b8884d47bf7b3cfd7be78da2a2db1
SHA256a006ac1c1c2dc56be4ef0a3133e5e5b3dc46b7a6ea0836fbf0238253b76c1038
SHA5120d833fe6d341e34e78967a8bb0d049ddbe24ec89a1428b6cb5bbea44d61b77b667d55874a012d469f55926f1a4eb58a8f435cb3ba53d7f3e9c8b34f37f5fa85a
-
Filesize
5KB
MD5af6365965cd3005d13a1ce43c7fd3420
SHA1bc31ad663ec87a2f3261fdf6ff49d9c7bab2286b
SHA2568b2d062fb00506e637b292eaa907df06e6ef106b3873143f7dd2b1026f8f1619
SHA512f8839ff481bf0458ac9a037157138ceb2130c9f8f3d857bb59994aac2433354301cdd09502c7d5dfbde1b2f57aed39b9f8dac6f284071fce1704c771a76f368c
-
Filesize
6KB
MD5b32234c3b17d2ea6cc222c2a72be91c7
SHA196952387f85355bf071d092f1629eefb623d8be2
SHA2569a94a0aa686acd7deaef86366458da867733b6ed21553fec902a6a247cd83dd3
SHA512421c7bd27232d4e1d4633386a9c487c755afa83f00c356f5c530605792fb0eefca46c475cfd57526b78f6c5b0a1f50cf6e8b4de9562474e3fdbdb06f20aa8611
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD532f787d7d9232eb2578daecb4c32d0be
SHA1949c2ae1a5e2c0ce762d7dfb5adbe2ee023b5ab3
SHA256b286d177fd73c536518aa570fbaa9e5cfe4351fed0cd9cfb7661a656b1a2cdb1
SHA5122e7f3470a471ec7e2d974df9c406e4c6f9e693dace43953dcb9453ec5fcc791e30bc7ec9b8b136aa9ed57ffa13245543e5a45a49ff6a5938c62a5c63162c52f0