Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/06/2024, 00:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hoo.be/mamafreedna/1PWaPU3xGGJ
Resource
win11-20240611-en
General
-
Target
https://hoo.be/mamafreedna/1PWaPU3xGGJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 240 msedge.exe 240 msedge.exe 4008 msedge.exe 4008 msedge.exe 4092 identity_helper.exe 4092 identity_helper.exe 1560 msedge.exe 1560 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4384 4008 msedge.exe 77 PID 4008 wrote to memory of 4384 4008 msedge.exe 77 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 2980 4008 msedge.exe 78 PID 4008 wrote to memory of 240 4008 msedge.exe 79 PID 4008 wrote to memory of 240 4008 msedge.exe 79 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80 PID 4008 wrote to memory of 4244 4008 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://hoo.be/mamafreedna/1PWaPU3xGGJ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbc1413cb8,0x7ffbc1413cc8,0x7ffbc1413cd82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,2394754950427086331,15724299038802876779,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56f738fcca0370135adb459fac0d129b9
SHA15af8b563ee883e0b27c1c312dc42245135f7d116
SHA2561d37a186c9be361a782dd6e45fe98b1f74215a26990af945a2b8b9aa4587ec63
SHA5128749675cdd8f667ff7ca0a0f04d5d9cad9121fd02ed786e66bcd3c1278d8eb9ce5995d3e38669612bdc4dccae83a2d1b10312db32d5097ef843512244f6f769a
-
Filesize
152B
MD568de3df9998ac29e64228cf1c32c9649
SHA1be17a7ab177bef0f03c9d7bd2f25277d86e8fcee
SHA25696825c1e60e4a87dc5dbae78b97104e6968275fa1602c69053d0192cae143f43
SHA5121658b0bc504a8a5c57c496477cd800a893d751f03d632ef50aff9327cd33ad0e4e4f27bcb85b20bd22bef2ca65600b7d92e2a1f18fd3d08ad6391983de77beaf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d3b3d0f4d19c2ef2c0bd7eb5e351c141
SHA1152e08e2b0198a9d2387f0ccf16d858180461317
SHA256b96fd618f979a72f0a553d9545df1381d4585b576117085252a8505164365567
SHA512905691a9215139467b198d597fa64ba3711a5f5b888ca357479dc02501286bb7dfeb0ee3815f75ad6f5dca30f8eef9178b1468a3dfaf7aeb49ab90d4479ac246
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
995B
MD51e64aba6238236846c88384ee9a3c51b
SHA1187d635f5e66c3b192caa32a762438987f825ccb
SHA256c343e8b92c299c0f16a9a6cf1511c00a65f72494e3afc274728191df27b8f806
SHA51212226864044dfbaf9bd65c3063795e4fb749fd6465e9ffe7c7ca51fd8a6eb15183bc67781abb2a25253ba776c679a5f53b3e6db851b8cc1c035be73d1eacd8f3
-
Filesize
5KB
MD546c89accb2c11fde3e9ad993327522d1
SHA1276f4d2182c017bae2e148814b6e1f9259631c41
SHA256e4f32dec5214ce82e815cf6563d01a1b773790f488bb383f39ba53b3448c5811
SHA512052462f024222011bbc459680130e02ac30ffd11d2bf4e1bbd3d6c2894e6bed3a28366abc5e5f00eaf1f082e15bdba968b81edd9d8d4fb5fc93764ae8b08eece
-
Filesize
6KB
MD5ef5a3602427a69714a62926a480705bc
SHA182da541e6d68e7b51a7c7461bc6fc31700d8dbcf
SHA256bf62d622d2e7f2ddb43450c619678b0f8439347092cd70d7449f0cd1a24bd430
SHA512381a03338e6df501d5a4ef24e339e28b8a96845ca5da5ec34b750c91241beb9b83148da679c6279687ed32bc3d5f490650f17246d4ae34dea565dda2cd870d4b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD552d7379f718e2e2bd7564982730be120
SHA10050a77ca43c0f0946251ec8c3301cbf1c3e6999
SHA2566939d01e6162d72b8da21edced75a46f6b44653ce81bd5a29698b4d5542c55eb
SHA512576977b0bebb302c47b8731e3303f0f7d0133ff4b5137f221c8f737c3e83220135772690b9c4f6141e08c37e474ee141be3cc80832676cdc6a1127836439c359