Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 07:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://context.reverso.net/translation/english-arabic/
Resource
win10v2004-20240709-en
General
-
Target
https://context.reverso.net/translation/english-arabic/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1620 msedge.exe 1620 msedge.exe 968 identity_helper.exe 968 identity_helper.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe 1780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3344 1620 msedge.exe 84 PID 1620 wrote to memory of 3344 1620 msedge.exe 84 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 2572 1620 msedge.exe 85 PID 1620 wrote to memory of 1608 1620 msedge.exe 86 PID 1620 wrote to memory of 1608 1620 msedge.exe 86 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87 PID 1620 wrote to memory of 4116 1620 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://context.reverso.net/translation/english-arabic/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bce746f8,0x7ff8bce74708,0x7ff8bce747182⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,5302206975704623924,2704176498895749946,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5204c3b88ee772cababf8272d53cb0c82
SHA12bbec034593c5758cc48ec2a13cdb3978c7e4a0f
SHA256d45bb25cdc22c4f1bbe82b070dfb3cc8e466a5ad48d45b569854cb8deca92c01
SHA5122973e49e895de555228f61223187fe854d56561ceb6164c57da02f0563816380e8a26dba8592073c897e6757823ba0ecf389718b9778934bb80e80540eb43c79
-
Filesize
1KB
MD5fa7fcf8020c570881800d21676146f2b
SHA190d1635356b7d2224a66342592f97421bc409e19
SHA256afc25b4f0bc4b4357f533e480eae5891fccb36d43f61d42249b53beefd2d8b8f
SHA512837fb333b585b3dcbc170a21ac873a506b1f8c135c990ae7178ad72f5e8928aa0d53d11351ca5c4120cf47ce490fc1d0edce9533613e0cd4d9d6b8588b99f536
-
Filesize
5KB
MD5ab86830b35625afc54b494beeeaa1a30
SHA1d08601772db77342952973fe2a888dc6484cd13a
SHA256fd6f1ed35421211d12b1e28669ca9f19a8f925773ca7e316c4852d10c7e4a10b
SHA512f9bc3a78c97369ae8d332ac95d17ed6a5137a94eee3dae6cce36477333230c351ac05c2e1039ec472e8c763cef222bddbf7336c6f8f0cf0653715500a6fff20b
-
Filesize
7KB
MD5d1a5cc7b22fce66bfda1a125f4638c7a
SHA127288140d485c4ae92817021b1063a74a2e2584f
SHA256ded6935f6fbb35d9ee052a40c9550b2a91474935ca453a7634a3af1bfa61b6fd
SHA5123f18b42992d24243ee55f1a9c5e538168e37f498143f16420fd99566c94d4effa10d63727e4f07ff50f47b04549db14c2f2ae4d414e899d1cd8eaca124cb2f5b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57d8fe318eeae18488c1a8e95d8482dc9
SHA13f091869c7124445026ede2c138843c8c3787752
SHA25681551c661864a3d3dd66f1f2046ab7550dbfd94443cfd42107bfbe84fdd893cd
SHA512fa948d1f8975506f918c2e3d88754bffc0c75ba7bd855ea756967d991189ffac5f2ec9afc2258a25c3f5dc1d331d60e76f40638a23a3dac64fd41b4081458131