Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 12:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.entilocali.soge.it/
Resource
win10v2004-20240802-en
General
-
Target
https://www.entilocali.soge.it/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 4140 msedge.exe 4140 msedge.exe 1424 identity_helper.exe 1424 identity_helper.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 468 4140 msedge.exe 84 PID 4140 wrote to memory of 468 4140 msedge.exe 84 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 212 4140 msedge.exe 85 PID 4140 wrote to memory of 5000 4140 msedge.exe 86 PID 4140 wrote to memory of 5000 4140 msedge.exe 86 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87 PID 4140 wrote to memory of 2800 4140 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.entilocali.soge.it/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9835546f8,0x7ff983554708,0x7ff9835547182⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12395386154264902389,17214506990173665471,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5a92785a85e537e35b2c100d601db9515
SHA1735e6cc8ec1bea7aff2db7b856e6a7597c44bd2e
SHA25671fbdad8c5e64d865eb5fd0f8f2a7201d9f35276f68e69a2e0ae7880822c501a
SHA512d6bd4d25aa9414a186b8678ab6c3fed81016233203333c0854692bfe19f4f634867fe34dec478bf4b8169f6a958092f64e6a512566587d395f13d94059f38fbc
-
Filesize
1KB
MD5df95c766b0398c01052b026f97d0035c
SHA1b1bfe5f754e0fc373ab40eb62095e0b29ede7c0f
SHA2568843807f1c9b3387cc68b408c24f8462a0ffa73caf2a738e10c821c2ed4c18b5
SHA512a86ddab4fac278a07da0e8dc17d32e851efd28c9304ccca4582f7b3017c3282183d5e92b3a985d07522c5e6eee53503ea9a7b9985e7a5f1cf7c3ef1408b881b6
-
Filesize
6KB
MD50bf4e28f90e2cdde2c17d413568941a0
SHA1f108f105ddf2cc6c19f2cdc0bffe3c91ca3658b0
SHA2566f1c07fde90aed650bb9a6ebd23e3650f32944b3dad44b922a01453ca14785be
SHA51231ae5d104f9e4344a0ca2f1706861037859227f38b5924eaa08df934f4105a885a8cfcd586591691c793f8140851fabb3470a84180536a3b45ea76ee634e6a4c
-
Filesize
6KB
MD5774410a8ab17d7d96c1498463aaf89b7
SHA124075c27dd797151eb53d2f1c4a087d79f71676d
SHA2560b67e6a100272d83f1f57c26e8f238a8264bb502e442a16b1e7ef6b33121ccb1
SHA512290142eb3011531eccfe7b1718149896983ffc3a37a537c01896f6e1554fcdeab6bb67d21daab85c6ec601da7b5fc62f909782280c4ac5c24eb058ebacf3cfba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df896e9b29b1558f9295d24907a7b120
SHA13e840b2ec7c8361284f2ef98ba0952721cf52066
SHA256c070d25ace9b3220d8a73f6b8aa4f4db02ee835385acf9f7733047e601cc0a82
SHA51202f7d2268cc20a2d502eeca065f07dc2c585a42964331a1a099e8b538007896d835009fe78be895e4050deaf47765f6f2a36e1cdfe9ea3886dea5e9d2f081dc0