Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/07/2024, 15:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.myfawry.net
Resource
win11-20240709-en
General
-
Target
http://www.myfawry.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 248 msedge.exe 248 msedge.exe 4952 msedge.exe 4952 msedge.exe 3784 identity_helper.exe 3784 identity_helper.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe 248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 248 wrote to memory of 2408 248 msedge.exe 81 PID 248 wrote to memory of 2408 248 msedge.exe 81 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 956 248 msedge.exe 82 PID 248 wrote to memory of 1464 248 msedge.exe 83 PID 248 wrote to memory of 1464 248 msedge.exe 83 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84 PID 248 wrote to memory of 408 248 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.myfawry.net1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff8e8f3cb8,0x7fff8e8f3cc8,0x7fff8e8f3cd82⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1736 /prefetch:22⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1752,5706695075725376703,8958558647888304265,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c1ff2a88b65e524450bf7c721960d7db
SHA1382c798fcd7782c424d93262d79e625fcb5f84aa
SHA2562d12365f3666f6e398456f0c441317bc8ad3e7b089feacc14756e2ae87379409
SHA512f19c08edf1416435a7628064d85f89c643c248d0979ece629b882f600956f0d8cd93efbe253fa3ec61ad205233a8804807600f845e53e5ed8949290b80fe42d3
-
Filesize
152B
MD5562b59fd3a3527ef4e850775b15d0836
SHA1ffd14d901f78138fc2eece97c5e258b251bc6752
SHA2560a64863cb40f9d3b13a7b768b62e8b4707dfee1d3e86a07e999acb87bd7d3430
SHA512ef9fd3d83ab85b18cf0e0d17e2c7d71936f783e3ae38005e5c78742560332f88be7c4c936d4dc4179e93fde0240d2882d71ef7038289c8cbddbfc4790c0603c2
-
Filesize
6KB
MD52b7aff6d9c42cc6e2a1b968c7b96e933
SHA16f69d28a73c5e50a00d7d8c0b9bfb72ce4cae79b
SHA256c1149fa955b51a61690fa48ab20e9f2f0986f106576d6fbc26ba82864a696b80
SHA5124a5e8f3b63f15da82a6e91d38d845833d00180f8c66c52406296d7c62b00920e646020ba2be3a478765967306f6629c13c3bc8ef16d20a02332f68ff907b0e12
-
Filesize
6KB
MD573f18a4c66fa49984cc64d59f83dccd9
SHA11525de0e80ec7a2e8fedd57b243c15866c143c2d
SHA256751cda9258b27f07ce2e9b1596fc612fbda5e67fab039d9d7ac472e9fc73f526
SHA512895e826ef9eec6ead4161fe010bbdb6d7e68ee54ca773525c1d589ccd0503f82844e2704d8b2747cbb427849269427c7b48591c3b4bc1a92dc3fc7ef49e3f158
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5987c90eadb1e9863445c2bd4c8e47926
SHA12079eae35433f5a72827bb66217248eaa73f17c1
SHA256ce94e42b440755636f99a0e8dddaed9bb341f43b43493d26f880d5ad50ef4996
SHA5120e1fff5c1df467ffb91ed9f399f246596240c98e3672a91e4fe6966e9a61c62b59e7c1136ba34d0b27e90f6841d662f4d325704b747962a235f288a9fa9db32b