Resubmissions
22/07/2024, 07:11
240722-h1amqsvcmm 122/07/2024, 07:10
240722-hzd9javbpn 122/07/2024, 07:04
240722-hwbdgathln 1Analysis
-
max time kernel
71s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 07:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://adipisci.shop/m/?c3Y9bzM2NV8xX25vbSZyYW5kPWVVTTVZM1pyZDA1U01rVmtZMHgyU0hJMGNYST0mdWlkPVVTRVIyNzA2MjAyNFVOSVFVRTEwMTIwNjI3MzUyMDI0MjAyNDA2MjcxMjEwMzU=N0123N
Resource
win10v2004-20240709-en
General
-
Target
https://adipisci.shop/m/?c3Y9bzM2NV8xX25vbSZyYW5kPWVVTTVZM1pyZDA1U01rVmtZMHgyU0hJMGNYST0mdWlkPVVTRVIyNzA2MjAyNFVOSVFVRTEwMTIwNjI3MzUyMDI0MjAyNDA2MjcxMjEwMzU=N0123N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 3596 msedge.exe 3596 msedge.exe 1100 identity_helper.exe 1100 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 1068 3596 msedge.exe 84 PID 3596 wrote to memory of 1068 3596 msedge.exe 84 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1508 3596 msedge.exe 85 PID 3596 wrote to memory of 1148 3596 msedge.exe 86 PID 3596 wrote to memory of 1148 3596 msedge.exe 86 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87 PID 3596 wrote to memory of 2264 3596 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://adipisci.shop/m/?c3Y9bzM2NV8xX25vbSZyYW5kPWVVTTVZM1pyZDA1U01rVmtZMHgyU0hJMGNYST0mdWlkPVVTRVIyNzA2MjAyNFVOSVFVRTEwMTIwNjI3MzUyMDI0MjAyNDA2MjcxMjEwMzU=N0123N1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadb1c46f8,0x7ffadb1c4708,0x7ffadb1c47182⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,48119318242180362,13239561132765874873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:3824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
440B
MD5ee6d595a361630211435dac7b262aa8d
SHA108d3f5a4b0a24007a7e0a03c2de846da81066407
SHA25634c9f92e34ae8c42d17344b418f9f6d7a22fe9cbd0cf7dee75c23927826fcca0
SHA5126e55542dca69d6bf869c9b57156f0e87386457b5afac229edcad77022651b5bd6ef4a0a4d4bdcaca46d036754f5b09f58ef2bbc5bc0c0c6902bc414f369500c0
-
Filesize
6KB
MD500d83a4b4c5b79b9de6d0901f856bfdb
SHA1fcbec2b184579da553b6af5cf4683945eb60a368
SHA256dd89c2e2aa4556c85dd5c3c94d03c6b7e843f900e47e095a4f0c3c1366b50afb
SHA512b5ce3d54b3694a71a99c0b893db054898f5a82b8e938a8ab77815ead3747283ee3960372308d335c8ea8570f01fd4161f28eeaf384ee4ca1880657ee94ee4ac1
-
Filesize
5KB
MD583317508617caf39b30ce5793804532f
SHA122eafa66160a18bc9d938bd299078b8967e8911a
SHA2566b4786afba5db50f5d6135a01eecab3a506e2192e3a103846635692f7dceed63
SHA5126da078f7a24ea56e15c3d8f6202451b1a66e38b881072051e1a1ac903615062b7d745ea95125fad79dc86907775c79f63aeb8bd1c03fce6fafec6bbd2997a8c6
-
Filesize
6KB
MD5a98e3514ee33d3a2c18e444c1852c441
SHA1f4710cec925fa30805d8cdeb0e941073ef425972
SHA2563bdc5fc4da1db8e92d49830c5f26ee62558e34e88ea520ecdf92116c0c905be3
SHA51205955d0ddbf9d3549b4f43991c7c9b1c5bb22da958c483c036329bec0069574913a10de163a54a922cadc32fd2a77aea9448bb9ef9e0ae18de0502e0364f070a
-
Filesize
6KB
MD5c9fc327b6e94bf43c3b20ec88bb79664
SHA1edc8d5dff7a290bd824d3b6385b4e30075420a7d
SHA25699cab658c78b75479fe119d08ba98ac40eeb94ed5e756e07d4eaa37c85098f96
SHA512f88da103da5d4dea417da7919287cae0e92a25572d8ed2ea946309b616e750966fb6639c101db65eee1a6df33069c60aa2b9527c04a9c7b39b0eb8ac3899a833
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d502e495fb23fb843971675a68f27bdd
SHA1041dd4ed32ac700d5988290c3acc74940a99f0d4
SHA25694e1c7dca00c85a7e6b6a5929f21f2ce09c488dc6f5cbf1dcf50d6c679ec4a80
SHA5126d7d6f73eceb06ef4af2839ad5c256e14eaf9be4aaa134ac79532269e4c1c94e3ad791bd02d48c717ac3817c049e00096eb8a276971ef25fb2317f9fe4fa4594