Analysis
-
max time kernel
296s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 12:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://archive.org/details/6548553-Melissa-Virus-MR73006
Resource
win10v2004-20240508-en
General
-
Target
https://archive.org/details/6548553-Melissa-Virus-MR73006
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 4268 msedge.exe 4268 msedge.exe 4460 identity_helper.exe 4460 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 892 svchost.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3092 4268 msedge.exe 83 PID 4268 wrote to memory of 3092 4268 msedge.exe 83 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 4984 4268 msedge.exe 84 PID 4268 wrote to memory of 3832 4268 msedge.exe 85 PID 4268 wrote to memory of 3832 4268 msedge.exe 85 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86 PID 4268 wrote to memory of 3756 4268 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://archive.org/details/6548553-Melissa-Virus-MR730061⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bed246f8,0x7ff8bed24708,0x7ff8bed247182⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11503994196163145699,9552433111008190792,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4308
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD576c78564013eeb597e9a2e89c273f846
SHA143b3bfb779a94baadfd5772074e26a6190370860
SHA25645939c6739aaecd1799292407a656febfbf943ff8f78216e5e9246c3bbc1ffb3
SHA512eadca4689339d394c791a2516c2e308ddd781d29705edd040e1c799fa5184fc2e1d11084bdff21e679680dd063d2230e8e28fcd79ed976d6df911ddb2b235717
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\32d78615-9211-44c2-a600-a63b1f50c41d.tmp
Filesize5KB
MD5fd743610c676ccd2343eac9437e1ad33
SHA1c241c83c66048a3c972d65746f20666b474589d6
SHA25630ecbead5c168d1142c861e752863e6b472e902a022f318e4ad4a387e720115f
SHA5121e7d7f1c2a15f44a8c6d6432a77471518d24ccbae7011d4933db42c3630f8c413e92c952fdacc926ab1ea648c2e9e038d061340b36d68b8e58e4b1f6a590ad49
-
Filesize
6KB
MD51c08469c560b617dc97694604304635e
SHA11e72cde4889b2ca8a8fe3b01fdc23ccc19a0f51b
SHA2562bd862e557cbaca7102964fb84a2cbab58c68e9bef8e306bf492a158d469599c
SHA51292a767eac4526affee4f739a9938b548cbf1a9c2dbba2108153ccb18bd9d4836e89d6bb6ab378e93fcf6e3d52f0677af441b9473ec3fcd1906b8e8fd2f550ddf
-
Filesize
6KB
MD5c5ab65825f6a09f6ddc4ca7c158a3a65
SHA157bbf2da397aa384b452ce80d19f0ca2955d2cfe
SHA2564a164c7ea010878fc65c9c54285d1f2fd84d8ba54a639d0aa01550fb5c35778e
SHA512f5671ac12206b9073edab11838dc6fd97e895f013851e0679256e6592cb4481109dd9f99d666336974abc489be9ffd091779362ace5921a6e405cd1d3bfee481
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD50228d276572a9478015b215edf64018d
SHA1e9832976e98858abcaf6eea6227fa43367a1ef83
SHA256d0966e5265594b473a3d93cdee7756754e9508b180971eeb22ea670e49236d7a
SHA512b2bcc29bfed3e1c21c8efbe666e731e8de2fb4722f4540dda2c87fa04da45df2f5f294b0d354db2df4588ac7e7d7c465e82c94e73451fffeb1fb24ceb732b75a
-
Filesize
8KB
MD56f2143e15ea436733cb54fd71c0737d2
SHA1f34997cbc6890a1f0146939f9cf43bde5a5a78df
SHA2562609b095d96698d534e939e17fd74e0693d507d595cdfbee8c57b91d52d86bfd
SHA5123e2dea2ef789dbf7f59b8d17d1b51dbecbba6c6444db44afed1930afc03f0988d9db3f9066953d3077d03d36c3654435df2c606ceedc32c7fdccefb99956669e
-
Filesize
264KB
MD5330e7e1a9e73dd8fc1c2de920c14a033
SHA1b1bdef1ff9e9253d94daf4b98aea661c4a00acbc
SHA256bd5888b039fab06cd40a30e7159e0b92affe0ee2406e4faddd26f0ad335f7c8d
SHA5126fa9dc62a6d4cb775068b20efdb90cd31337dcc6a956d188511e427f2e24101337bfa10e6afbdef73d7869a3986e0d5a752fb146e99a9eb04654efee3b007062