Analysis
-
max time kernel
45s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 22:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://m.exactag.com/ai.aspx?tc=d9608989bc40b07205bbd26a23a8d2e6b6b4f9&url=https://hr.economictimes.indiatimes.com/etl.php?url=//goldentree.live/hdfsvs/welshbd/new/auth/mthigczzsgo0p/%2F/YnJpYW4uc2lza0B1Y2IuY29t
Resource
win10v2004-20240709-en
General
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 73 ipapi.co 74 ipapi.co -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 3020 msedge.exe 3020 msedge.exe 2468 identity_helper.exe 2468 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3516 3020 msedge.exe 81 PID 3020 wrote to memory of 3516 3020 msedge.exe 81 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 3952 3020 msedge.exe 83 PID 3020 wrote to memory of 2260 3020 msedge.exe 84 PID 3020 wrote to memory of 2260 3020 msedge.exe 84 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85 PID 3020 wrote to memory of 1928 3020 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://m.exactag.com/ai.aspx?tc=d9608989bc40b07205bbd26a23a8d2e6b6b4f9&url=https://hr.economictimes.indiatimes.com/etl.php?url=//goldentree.live/hdfsvs/welshbd/new/auth/mthigczzsgo0p/%2F/YnJpYW4uc2lza0B1Y2IuY29t1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ffc546f8,0x7ff9ffc54708,0x7ff9ffc547182⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14178334144559346155,4242013465986568356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:1068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD593294996dba58b752b74a85da969d77a
SHA11ab919832fa04162e5f0872b93bb6d653167f6a7
SHA25607461f6f9abff70ce8adfae63674f8183e771e68a4c04b15774744cf976e513d
SHA5123e47e89cc094c249f4d48061fd8dd3b18d6b17b3acca06ce7f425e28c1a01843b35fc87d600c92ed8312310351ff4f782c96537b0e25ff64d6001aff2c509848
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5647dd79f48e85992b10a6172965119ac
SHA1281bad74fe619ca867abc0c44f811b3c0d077ef9
SHA256a576462a78aff6616c0ca1df9aad7f76e0456fdedd6a67636069c57324ed31c9
SHA5126dc2725a0a2f8b77f45eb8cec8e62f572b2f41769924a0b109d214f70fdd37b00d8beb2eea83833af62c6caaf5b686bbde37eb46dcf0bb3361e87487f91867f8
-
Filesize
6KB
MD575d45e40a74f4c62bef08602223339a8
SHA1fad8688001212b153eb5884f7b02d2d9a8964e06
SHA25669f40f051da6a778fb2e0234c72e37a7c097523d9ec4dc515ccb5a6a5517ca05
SHA5121c6495d94e98b766a40653a21de26cded5e77c17f3f4ab7142e8f66d116add4bac10591b8126e9b0008b6adcd2705f0b51532fdc301450aca93f6b1f44a7d471
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD59f784362e014fb217ac0768c72e66933
SHA133ef7ef24c82399d4d4897bc6ada0573ad47f2b9
SHA25610ff5e013a3e98b360bfca94510a779a8344ad8c7125e5e4cd0115ecae6a6e17
SHA5124ab387b0ef6e94e4f334cc92305575831afa57d83d059b321770c3d9ad44a92083e9a1c331483a59c35067510359bb5e8c03a2bc3f094cdf67732a22e22f1b67