Analysis
-
max time kernel
35s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://himovies.sx/
Resource
win10v2004-20240730-en
General
-
Target
https://himovies.sx/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3180 msedge.exe 3180 msedge.exe 4124 msedge.exe 4124 msedge.exe 412 identity_helper.exe 412 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3820 4124 msedge.exe 83 PID 4124 wrote to memory of 3820 4124 msedge.exe 83 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 2516 4124 msedge.exe 84 PID 4124 wrote to memory of 3180 4124 msedge.exe 85 PID 4124 wrote to memory of 3180 4124 msedge.exe 85 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86 PID 4124 wrote to memory of 3676 4124 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://himovies.sx/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8084746f8,0x7ff808474708,0x7ff8084747182⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,11438055161118136210,1495689270167001614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f424846d13eef75a8065348e647b5c3a
SHA1be8a5c387e75f166f933402aca3f6e6f2129e4cf
SHA25640be99629f284d8f3b43c24811b93d372757306f37adbaa90e785ff2604f52cf
SHA512ffb2097c52a3baf18361348787dcb92cd10da54a25d85600184b0182d50f08420d91ac031141871868602ca788cd0eac66e302e8ecce220b2f707f8741e3d178
-
Filesize
152B
MD56c3a0da38ed31721bf66a6e7519f300a
SHA1db05166b0c96c42e4f89402f1eecb0ce00c5ff7a
SHA256e13bc70f7eee42221ce6f2ebe017538484dbc6ec1059450cae7c579dcb8e6199
SHA512c38a4e591360ae323d9be207ce2af8375ce3797bd16c3da2b8ed96c480d64fd1fd3062b1cd178f7be2f01477b68fa3404c021903c51abaecc90881f96bec76f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize552B
MD5569d05cbe7e1baa1a5816e7f55144017
SHA152ae5b150b42f7401096cc6524aafd487e1bdc36
SHA256b7a520db72bad303415ccca8c10d2e36ff3186e1bae033500650f6d1db67eefe
SHA512d8ff3152eb4ab81faac3b3d72efbc3889cdd9a846e98ceeb4723b925481004e0682ea14ebbb84ae8490789414bed82a349dc350cc87f04d00744283b60c0f38e
-
Filesize
2KB
MD5ae098159e6fef755e0db008e61b6792f
SHA189f4ad54b9f2ce846460c8cf3c4daa8788899b23
SHA256783c20553398156b7532e3c6db2d6609719b07c94e84682f37316cddcc6bb855
SHA512265650e49ae6a78651fcaa92a19e2c1f5b0ae2e3832a28e42732c303e0f30530ac8a39bb7afa6b21f4d01fa5998ff59677399516fcfe29005512eae70cdebd11
-
Filesize
6KB
MD5063600b2c6d0db57537352cdd1d5bc08
SHA17cd82a1d5fd27510369e6ad88360f10719f13b88
SHA256e644af2d3d45a2231fb9634c87ba9a6cd892ef41be8c62116a4d1c736ed12693
SHA5127a6bf13c9883883c1e46651a78843b81849434850f9ecd2b91a1214cc1e01df07b853eebddcdd0c4603ffc20de43c15b9db35ea37614b61eb6dcab5365d4666a
-
Filesize
8KB
MD56a441d418ba0653dd0074a50a0db8848
SHA101cef83a37849b9ef5cf914dcbc623c571831ee3
SHA2568eb7e6f8f6330d8c154f2226d0fb80cd9f851171065a6c9bdfd7a6a55ba2e82d
SHA512cff2e634adb87897fc1fe967d0f41d7b58358f4d29fb9be5c43e8b0f5a012549cf5608b284d46da60f0bfd1c8fc1d1972a5b5cdf531ab48e5f73ebcdc4d7a9fa
-
Filesize
7KB
MD53780a24bffdbb32e75f614743b9abad8
SHA169d4d3d23eb2ed3937b5dafbc130acf4888bb130
SHA256fdb65ee9f7e5959156600e7f24550dd273fc4bfa282b358d2ec73bc91d828ecb
SHA512f22bc6a8e637a4b09e92349af09cb5a5ff80ba3ec7021e3511b8bf593829425cbfc39826f050107e888bc8bfe9223050868d579522c2785998418e3c587033af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55a042f27a415134610015af2dfa39b68
SHA14fec8a4050c4df7c1ce54baa8e852552b6b60e52
SHA256b3c9ba87b288abb044654c42ea8a25782a3fde7f533276463be8421599896df7
SHA512e673eb9c324bd62487d2c315be727a7614b84b251791ad74dc17c033d22d29c729682eb8a3f423afd8a6d0489de007c3901a67199fdcd079b57392b5819ac15b
-
Filesize
10KB
MD5e669aa538f4464e11051ea858b9068f1
SHA13dc8b581137b719a957e3b673000aed50b154491
SHA256ad4c09a4702b6e7d610aceb9831a0aab16a62b5275a25a3c2ab6ba3756665f22
SHA5120df0a8f05553565ef64e948a729cec4f9095e96348ec21fe99135a5ede2db1661e3ff0a1ebb40ef4e6956b23d0510a2021bcf36facce0bb9c96d9b9b3f01bb43