Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 09:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://sicurezzajekoservice.it
Resource
win10v2004-20240709-en
General
-
Target
http://sicurezzajekoservice.it
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 392 msedge.exe 392 msedge.exe 2064 msedge.exe 2064 msedge.exe 3552 identity_helper.exe 3552 identity_helper.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1840 2064 msedge.exe 86 PID 2064 wrote to memory of 1840 2064 msedge.exe 86 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 4632 2064 msedge.exe 87 PID 2064 wrote to memory of 392 2064 msedge.exe 88 PID 2064 wrote to memory of 392 2064 msedge.exe 88 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89 PID 2064 wrote to memory of 3404 2064 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://sicurezzajekoservice.it1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e75546f8,0x7ff8e7554708,0x7ff8e75547182⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1464 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14646743188173259046,11058707621105945357,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize888B
MD565e9b18139806407f6733c7fd2fe693f
SHA1e1e4f917574cc32d1a27cc188565871bbe2158dd
SHA256b55346b01886f1b20e9c2bd1fe6d5c57fb148017fe5039c6bcb129812f66e4be
SHA51241479873f2f21cfe496f1ce32d7eff25f95f67456685fe4b52e780fe45d72d018da2b9218085c57c8a08f66d98f160cc417b8c85d28d47f25075350b0eb1fff5
-
Filesize
664B
MD522505ca5f97ad8c26b1b7bb3b46267ed
SHA16be7d9215b09a8c4935b603c7bc7012cad6d3d75
SHA256b09647f1f83ba3b93908ec1f2ab9daf1de0874b4cc35457ec773eef95ad2a8d8
SHA51280e268a9c429ae0a1dc30f3698ab72fc3a4be41ce1eef04400d0dad32dcac4221c1713f5f495a8fcd82bf3109247245fb0c888484ecf4e80b6424c5778cc6fcc
-
Filesize
6KB
MD53810397f8206ea18e307b0d6e9a458b3
SHA1db874747d9348f9e332594d8c5c481a208ed4ff0
SHA25685e81dcacb4c964b9ddfec9122a6baac6ffc136ca444b3c7cdd97d60c231de40
SHA512c8f7996b1cce187187d2342095f2170ddd82ad95c8f45faf67e9316e568bdc5ce6c5be2f7be56e6a0231d2448e22552565ff14c418ad86c8498f095797c71023
-
Filesize
5KB
MD512ab653e1b7d53eac83165862b5e788c
SHA198cc3c8ae17d4fd5d106707d802b09a000e1d633
SHA25654b99744e3fbd03923eb7632ecf1bff0b8c66426b2f9655ccfb4b62cd3e66239
SHA5125f1dc7dd16bcc52f20a4fa08a64d5952d24bdd83d0d19101c8cea7a7abc290bc53678e4411d82789cac0894ef4d00866906e5188d3fa7a312ecf5b6fad4ecf05
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59a63dd20f092895db32fb77b9ed2f4a5
SHA1f3bbf06d5b1f01935fdc121375f4e7dacb966f5c
SHA256dfff6e149625a79aa34910ebb2c9f396ffdb7eef5535e3d9417da6c556b0b0ad
SHA512790d84a70ddbffdff8e618fb3a9ffd008bcbba3f86d68a21117f7c504659c1a8c6da1d93afca387af781f802f3f74e3abc8768c3621fd641155f1e79e3c08947