Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 04:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://conversion.proof-link.com/index.php/campaigns/sy897p8rgya48/track-url/dw648s16h96a9/df47c7db74c6b0ea938044e93ec1974de3e8fd1f
Resource
win10v2004-20240709-en
General
-
Target
https://conversion.proof-link.com/index.php/campaigns/sy897p8rgya48/track-url/dw648s16h96a9/df47c7db74c6b0ea938044e93ec1974de3e8fd1f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 4832 msedge.exe 4832 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 392 4832 msedge.exe 84 PID 4832 wrote to memory of 392 4832 msedge.exe 84 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 228 4832 msedge.exe 85 PID 4832 wrote to memory of 1372 4832 msedge.exe 86 PID 4832 wrote to memory of 1372 4832 msedge.exe 86 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87 PID 4832 wrote to memory of 3416 4832 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://conversion.proof-link.com/index.php/campaigns/sy897p8rgya48/track-url/dw648s16h96a9/df47c7db74c6b0ea938044e93ec1974de3e8fd1f1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x44,0x108,0x7ff9eb6c46f8,0x7ff9eb6c4708,0x7ff9eb6c47182⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2316 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,962732475096154675,15990692016275297266,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c8ade4fbf2c4d8e69a134d574b1b602f
SHA12ee4211057d196a73524ff0250ee9bde206d4d45
SHA2563f8ee829aba2110f023c0f6be126bbfec69fa587b01fdc5ce385c3c14a75e80e
SHA512d1ad7fadfa6110b3ce6a73aaeee23a1490ba28c27959fa01283d5e4c0f4f961b12e498cab34d1cd1193900b4868217e931be2e2a7415d59a8bbfb1464c27bd87
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD53a7254572767a9fdb72d0f9a4c066e49
SHA1f2fc067df73337d94cd3c13c467c21a4219b20c0
SHA2563cd81410c91acde419dde62b926f2a9f2d6fbb792c379200d12f5d3b58202b8d
SHA5121e7f4b18a3ea3c5eb207cf2c699329ee13df9c15131e540d777d40f0e7b3f18ace4d45db076e4c67519556234b321d7a5784d7688856d3ec2059d477e1095b6b
-
Filesize
193B
MD5113f75845fffb9f678dfff8f94fe2baf
SHA182e4959a2dd733de8b8570e6abec44f4315758ff
SHA256b998f5f721951d1462055ec051745b21ef94bd0cdcaac37f8be6bc6ce87c815a
SHA5127ccb2adcb5b7f9256d8e5ed5897907e2ce09db3ac8b8a7d9f23d4f99b7f98e343441ed546b16a163628df2b9bef486fa97f10e323322189674d6780985dcf560
-
Filesize
5KB
MD5960e400126e16d58dea9251f1433d98e
SHA1e4fb62bdc683754b9117c0dd6cc86647d54b328f
SHA2562014fb685e05213929c0d7e26ea4800a37b1b85ec80478b0bbe97c567b97f046
SHA51291dbf616a857abc3c3c1148bc17e82eb046a9c68234daa472d6895853665650cb3e492361ef52088bb64e3f65eb40c136b0d6611cfe756710d5f4a40fadee1e6
-
Filesize
6KB
MD5591ea15842de14ced6398ddf70bcf988
SHA141a9f3e15cd21a77f44c85bc6bbf3932ff877a5d
SHA256de22e74042c644327e4ad4585dc071e168f80c757938f423801d59a354d7817d
SHA512d21341fa6d7300dcd26201cc7dbfedc5b0b2e264262e74bf5e55add3e2f94cbad3f67b415a94fa65b45b4e805af371b3ded0bb8c8589c21236a58ea64084c1de
-
Filesize
6KB
MD51310c88771b8067afcad5ee08cad79d4
SHA1044160822913e82015cbb2a12b207140777a6473
SHA256e12eb086cbe8929125b6491bd28dd50b8f370dfca4c121ac4d29c5d739225d14
SHA51253fd3b2cbeff99eb5a322795e39ae12133192ac6218b00d190c7c3b0aa7742db6e1dfb83b7a087a16ff570bd883965630fd20a46009f54f3d185f9f7cb39d8c5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389