Analysis
-
max time kernel
37s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 20:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qrco.de
Resource
win10v2004-20240709-en
General
-
Target
https://qrco.de
Malware Config
Signatures
-
Legitimate website abused for phishing 1 TTPs 2 IoCs
flow ioc 3 qrco.de 7 qrco.de -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4364 msedge.exe 4364 msedge.exe 5044 identity_helper.exe 5044 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4164 4364 msedge.exe 82 PID 4364 wrote to memory of 4164 4364 msedge.exe 82 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 2028 4364 msedge.exe 83 PID 4364 wrote to memory of 4860 4364 msedge.exe 84 PID 4364 wrote to memory of 4860 4364 msedge.exe 84 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85 PID 4364 wrote to memory of 4308 4364 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://qrco.de1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9312c46f8,0x7ff9312c4708,0x7ff9312c47182⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4539309048088014086,17684980886622224136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1852 /prefetch:12⤵PID:4836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD54e0a15f2a14ef16f42feca8be8579f2d
SHA1a639bce27e2cde580d0fb4e58602ca4e3e2e95f0
SHA2563d1da7b64acf304d9a07523edf5b567ac55ea56ae099bf73eeca4e8627b2eca4
SHA512ce876c2458cf1e6a80ebb9f726c75457ede7b2505f6f5a587f999e5191f775738aad3e2f8fc03bc44a769cdf3e568dd8660613693238ac5bbb94e1f11b526278
-
Filesize
6KB
MD5005fc13726248b260ef4e47496924b89
SHA12a12bc2d11a42b3ee676ee1a1eaf6dc803d09381
SHA256c0386c04a4225661eb592604b07b31cdf36185ae4059582be9bcf8da48197c9c
SHA5121f81833c13ec90f60471d6a7cdcec316e9331faffc9e88ef061c4f1d0da271dad9d94efa0d57cc2e3bb7e1ede0816cf776390dfef1c316aba2fdb185279d82a2
-
Filesize
6KB
MD5a61a1acc6020a73c6ee90946c880a8e1
SHA148d9b1eef9d35ca384a6218a384e6767b69e940c
SHA256adbd6894733abccc132d205a8b3f00257ef0f018644478e19a18fc8604bdc4a0
SHA512cd24c5fd465446fb69957660a4a3ec2454206bb5197c354c8c8c714479e0c059f70d99f637f2582b17ab67942569c46e45be728e46f1ddfe85801e243ec1b493
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58db7f7c7b7b61379901d872f70cab9c5
SHA1a757f5e929e8c014ce031b8d6d2aa5066fec28e7
SHA256abfc4ecff2c7b97106f07181329c2e95445570b24a1a35bd54c81b1d9269ba3a
SHA5127b29a96b02c392f9617213ec7d98b5e34c2fbef9947b877e835640ea065ea503c99eeedc4bf8407a01ab9cef3eeb05a40fb2a411a7dce106a09694f47fe872b1