Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/06/2024, 17:10
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloud-object-storage-cos-standard-t3s.s3.us-east.cloud-object-storage.appdomain.cloud/exquire/index.html#[email protected]
Resource
win11-20240508-en
General
-
Target
https://cloud-object-storage-cos-standard-t3s.s3.us-east.cloud-object-storage.appdomain.cloud/exquire/index.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3096 msedge.exe 3096 msedge.exe 752 identity_helper.exe 752 identity_helper.exe 4460 msedge.exe 4460 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 868 3096 msedge.exe 79 PID 3096 wrote to memory of 868 3096 msedge.exe 79 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3356 3096 msedge.exe 80 PID 3096 wrote to memory of 3432 3096 msedge.exe 81 PID 3096 wrote to memory of 3432 3096 msedge.exe 81 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82 PID 3096 wrote to memory of 1912 3096 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cloud-object-storage-cos-standard-t3s.s3.us-east.cloud-object-storage.appdomain.cloud/exquire/index.html#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff876593cb8,0x7ff876593cc8,0x7ff876593cd82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2288 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,15596542703677958613,9658089892906669462,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e4bf11ed97b6b312e938ca216cf30e
SHA1ff6b0b475e552dc08a2c81c9eb9230821d3c8290
SHA256296db8c9361efb62e23be1935fd172cfe9fbcd89a424f34f347ec3cc5ca5afad
SHA512ce1a05df2619af419ed3058dcbd7254c7159d333356d9f1d5e2591c19e17ab0ac9b6d3e625e36246ad187256bee75b7011370220ef127c4f1171879014d0dd76
-
Filesize
152B
MD523da8c216a7633c78c347cc80603cd99
SHA1a378873c9d3484e0c57c1cb6c6895f34fee0ea61
SHA25603dbdb03799f9e37c38f6d9d498ad09f7f0f9901430ff69d95aa26cae87504d3
SHA512d34ae684e8462e3f2aba2260f2649dee01b4e2138b50283513c8c19c47faf039701854e1a9cbf21d7a20c28a6306f953b58ffb9144ead067f5f73650a759ff17
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5927cc2cb7e6b8dd2487ba1471416a6ad
SHA11a8111a7bd079bef9b66581e641e87a96e867c13
SHA256f8ac191228a482c8fc84076d0ea86b066cfd0b029eca635e040e3ba49e8a2eb3
SHA512fd32360595703413632625e792594b28a204c483102e5ee5d36d00a26ab4d084bdbe7be413590889734b84b044d29bdd93deaac83cc1c1158277eef872ada3b5
-
Filesize
554B
MD531ec97cc40484475d37c5575658c359a
SHA1c415a38fd5c87b8f662732fe7207352e5d9b4d64
SHA256712f23413aee74ab60f39ef08cd8b8a71a7ee110e02bb2287d534f8c543db31f
SHA512844f2f786b205d2bf3fbb5a921cfb04e39faf7a1e279836cc8dc4bf3a5615d67d84251163ab9e40416b59e8b40f1a81f462251ae28f1b9f10d31aade8bf45319
-
Filesize
5KB
MD5e049214c683bf0a6153397f7ab710449
SHA173833deec881b47bc35801d7da221d54190ae58e
SHA2561abb24f380f334d8d4ac9a07478a6c7933a6e94beadcd0c566750650fcf1ea58
SHA512b964ce897e1f162e5feca467f0e1bcabe064eb2b75e1d26e0f91067e1c7204abd7354cd32058d33db3650efa9f57e2a0b821c66bf6e040ad602f2cda8d625379
-
Filesize
6KB
MD56c33cd765629f026b32f533efb4bf595
SHA18c8a03b3481f08ab85b75fc59858bdf9ab07659a
SHA256ba4035aadd9a013da8e3fec58349d38967189a4cf79f4623e99157e4093240a6
SHA5122b3d2c0cbc437a73701202058bf76221608037a8a5176a98fe006023cbecf22a2581cf68bec99c00ac47dcaf8d1f4dbb6c3468c24b78c5a283ec3e9cad7e89b7
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5738ef6b77f2af79b93771546c6b20997
SHA11ea8edacbc0c1b0f6735332f8801ffe2ea0b32f2
SHA25693add78c4c7f266e1cacdef8314df38f46fa57b3ce29b06dc741172aeb9337c1
SHA51222ea62252ba73d0a26f50531847be41f25e74ade6ee833b27d5a030f82e8dd394673e138eec03dc73b5a610835bccb5737a481921d49dbbcbe4aa923f573252f