Analysis
-
max time kernel
91s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 00:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://6505412.app.netsuite.com
Resource
win10v2004-20240704-en
General
-
Target
https://6505412.app.netsuite.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2288 msedge.exe 2288 msedge.exe 1956 msedge.exe 1956 msedge.exe 4500 identity_helper.exe 4500 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 4208 1956 msedge.exe 84 PID 1956 wrote to memory of 4208 1956 msedge.exe 84 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 3976 1956 msedge.exe 85 PID 1956 wrote to memory of 2288 1956 msedge.exe 86 PID 1956 wrote to memory of 2288 1956 msedge.exe 86 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87 PID 1956 wrote to memory of 3668 1956 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://6505412.app.netsuite.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85e9f46f8,0x7ff85e9f4708,0x7ff85e9f47182⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,6629413824735944017,17547456986302780527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:3132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e7e181e175b10873212d634c8f457946
SHA1d7b514420dab357712017a0f9f9bfdeca6d62604
SHA256a5293797cce91e627defd0470eab2a68f1a19cf72ddf9ba2e9fb1d0a00c4bc54
SHA51262f213a27d9b637a33444af9eaebe78f69668159f57116fa1a018104849c8a3da9fde9b34e9c49d6dd338301d8c92f34cad08a93635102ff00ce1c76aa9d9ba2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
192B
MD5abbc6774bab59dd20f7bbdc9980cc87d
SHA19fe9e2b13bf093f35fe1cef85895bff17366fdbc
SHA256bdb49a1469b6c3f9237829ce16b9af847d8433efc08c52ea7c2713cac49172d6
SHA512eb0c6738e3a7fabfb545171c5ce0fa78db11818592d359ad1934f43f4fe820535cefb411629ebb9bd238f2e94eaa34a79bc8b31171de0ffc1f3d729f4c80a6ea
-
Filesize
6KB
MD57c258fe2c81ef92c6891f13df3b17971
SHA17182e87a7bdab25265df1fe2a5c8d2974473f5cf
SHA256c850d4981eb8fce1293bec0ca6d0c99b8a0e4da3f6e724e22bc91cd3bfa822b0
SHA512020e19da0683b4471c5882e6c0ad4ec323182dae564b9772c4beb8da45a8c9a01f4da86fd7b878a0b1e49be3db72de4ae102f956be284a20e6df779af7d6f4ad
-
Filesize
6KB
MD549c9471637d1541ca1d93b28bba87f6e
SHA12463fd804a54ae6a914029cb0ac824dd4854e295
SHA2569ee7701c665597010a6f049eb9f6a3d170070d51a3f9257bc8ce03fbd25d4609
SHA51263e49ce5c25a077261d087178a5fd703765ed77f6279aaaa2dfbfa6afcf664db289ef844fd9f205e67ad9539e2aac66457e1bad0448d9207dbec756949d7f624
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59a4dfe22a794f6c32e40a7629343093a
SHA12b44c214b9fb6c91a9a4e85c8e2c6568e5ea60e1
SHA256b768de424625dcad72c8559f43b2f75b2e2847d1a4950c55c44c8b01ca1770f0
SHA512402ae6dec9e82e234dbfe4409dd39be00892f48697e8383f2cea03b9e88f4d2f2712a56abecad5eab3b6c07976b99fc26e9ddeb9282df864589bd4695693edb0