Analysis
-
max time kernel
113s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.data4trail.com/25PBNZ99/7CDMXZZN/?sub1=13&sub2=350-15156&sub3=1265-362-21636
Resource
win10v2004-20240730-en
General
-
Target
https://www.data4trail.com/25PBNZ99/7CDMXZZN/?sub1=13&sub2=350-15156&sub3=1265-362-21636
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 1772 msedge.exe 1772 msedge.exe 2832 identity_helper.exe 2832 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe 1772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2204 1772 msedge.exe 83 PID 1772 wrote to memory of 2204 1772 msedge.exe 83 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4976 1772 msedge.exe 85 PID 1772 wrote to memory of 4152 1772 msedge.exe 86 PID 1772 wrote to memory of 4152 1772 msedge.exe 86 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87 PID 1772 wrote to memory of 1476 1772 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.data4trail.com/25PBNZ99/7CDMXZZN/?sub1=13&sub2=350-15156&sub3=1265-362-216361⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1dfa46f8,0x7fff1dfa4708,0x7fff1dfa47182⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,14322094167868196541,17895015987467173394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58d8ccfa6a8b1b15db876b848b8fdc102
SHA1dc7d92c35e9c84d8d78ac0aedc926214cee68135
SHA256b48f98046030e23b843422251481c3f19cfa0cf71fb36a8ff89dfcb152761f86
SHA5126ae61b6cf236082b9930686ad2650c3ce3fa337550363e0858062dbb399093b0ac6bbca3d4c40101e222ce764fa4fb704bfc591e6d5b0a6c165f170cd6c9d5b8
-
Filesize
152B
MD581e22c2898ac78c14a840076a8446b9d
SHA1ff5b7cca3ff2c4e77e6330e2c5e2b62bb56e9fe6
SHA256a5e570fc8d3a52027db48adf1301fe8dffc500a4bef04d0d6bff15fff78ade8d
SHA51219381615be8f53ccae56a21c29c314c3247ac78fd3cf838f52ca98757b54f945f0d178cfb44ea5ad42fc68b3d3e6e7ce4e4f40eb69f791fa5132f591c62388e6
-
Filesize
186B
MD58255b5028d46f65f72f601b31f4e2302
SHA11351ab59e12025b4f4c48eb99624480a0aa6f513
SHA2565989d6694e99804e97baf3007d380759af6ae7b3ff6d2c3844369d428e006835
SHA512871488a91ec42efd0b93ed47eb4f82b8209db1e56fb3eda0498448938896d480ee94e198a2f3ad71db74e735079b30ab33ce4a3410b0325e04612d9922529459
-
Filesize
6KB
MD59c9938567266b88556d24e3179634ec7
SHA1f8f274fc574b2f612bbb563aaef8745108606a91
SHA25627a098f28a78510b838c9d92d2bdb954b3e0a4bf925dc40ee128ed05e42c6766
SHA512faf23ed114f489499269cf2956db23e808a89d7b05d75a8c700142cd293b1dad68c743297cf8fcfa8b4f358ab3a93c90c647b4ad58444c3dd8207e86122e41cf
-
Filesize
6KB
MD53d88ea6c3a1cc30e97b2de796ee08cdd
SHA1141581ae5d95ece555eae3ec3c56ca7cfd3165cc
SHA2568976454ba80f7876b7b1393cb4b76aa34c5edf12b8b9aec605873cc2de16933b
SHA5121b17bad03ec3eb073a2d9c4f300a9ae6561f5d2dfc89c8741b43317a3317c0f15c3c45717ef39fb446c1df50ec6ae215333f7d7b043d6867d76c6a997fa55047
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD555006aa21942b1e9491194ae0278185b
SHA16be823ff82a343ee3da94973cdfab6e6cd479631
SHA2566c08549c34bcc73fea97adbc48b7f20cf2030102a7e76236012525680613125c
SHA512c3e9ecd9b7aea8e4ce16712f09fa7c6f1d7ed97cfcd0dc56d8989a5287919ef7c30213f5a5cb998c66ac8934a595d9960b54b85cf54fe5ce9cadaa99d252b880