Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 04:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fundnexus.org/
Resource
win10v2004-20240802-en
General
-
Target
https://fundnexus.org/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 2412 msedge.exe 2412 msedge.exe 1396 identity_helper.exe 1396 identity_helper.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 5020 2412 msedge.exe 84 PID 2412 wrote to memory of 5020 2412 msedge.exe 84 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 4404 2412 msedge.exe 87 PID 2412 wrote to memory of 1944 2412 msedge.exe 88 PID 2412 wrote to memory of 1944 2412 msedge.exe 88 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89 PID 2412 wrote to memory of 1740 2412 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://fundnexus.org/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe832046f8,0x7ffe83204708,0x7ffe832047182⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,6623905574823645749,7438762166205337162,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize936B
MD58c22984b963bd00d5b9ae2b18fdbd72c
SHA100867c7b3a3cfe5dc75d316261a4f660c0f772a3
SHA256ecd8333fe3d57de29f4ac8c019c2139d56794c5d0a8e555c8cfa8595e77db9dc
SHA5123c12f964c53ef7e1ceccd5c62dc830b913581eb317a4b19c7cee701187094462e8a41d34f49caae8a9cd90db2417abaf909171d7de40f9a60b1ef8dba479b668
-
Filesize
646B
MD551781b7495d7a11d195591aca1561eed
SHA110c5969797d31be9cc6a8b4ad0140638b5ab8988
SHA256f26b52d02c6faff5ac320a8fe5d64dbd5aa7ab93c6492bbf11ed3643cc5f6adb
SHA5122d9ec4253b6a864238d794d0e0ca1c86b06cd0967d9aa169816ea4579b189762ef76661d30a50f8fcb68e978451de0dd1cd51f68a73ff30af8489fa748e3b1ed
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5935640d8a850c0160b62f1af02750cb8
SHA1f6d87624cd67caa74c7e9f0befa4a33179a1867f
SHA2567b35a155f0affa63c81f3b2a269b1ff933feed0c0e860125908827bb074abf32
SHA512de432ddb240ff6bd4eda2feb057e2e945e5cde07f87669b968748a0c4e60e469c00b2b3032b1793fdaafaad50a4b53dafc71db8d401349d6b64c0133aa7df69a
-
Filesize
6KB
MD50a05fe2bbda41e8e835b7a223e680bfe
SHA1c2512bbd2022002941f17537ada5933f89b57b72
SHA256eb15db46794d2ac779fc9bf11b4ff20e1bf03d6b767816d9bd8f34ab65efa1a8
SHA5125a28f8423cec7e24212118317ccb27a50256e957f87b811c14f6469f7513ce1f56e77bb45b318ce6b2080c9bd10cb6e6ef422c4be7c91158a565c230f5acb3ab
-
Filesize
6KB
MD54f9e724ab83410b7385f54414b6f8d52
SHA19b602bfc2c16b44cced94dfb8307a199f4c4d0c5
SHA25689edebd1fbfa888c1ccf1d7e6c1d9bf7e314d19fb7ba8888da750546807addbf
SHA512f3e777edc598f96bbb7ff0dae90ec7b14ea6914d8e73505983b6dbcde342d9e1ae062050b8fe0e6ac7de9419f4f75f56a8b80eab794f377a643284efc71df08b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fead5f3df516ea79e3497c5dcec1a8da
SHA1301bbadc8c526cc445280e8d32ff3fdf85c77ae3
SHA256bd7461bb35dbac625cf89e33475be728c1480cb02b0040539854c2b5b90974f7
SHA512113024ed4075e557545351a7121ea74f3094a73613b682f8d7f17e3ef03fb479be673d0ca3c759a0003b4e11bcc65730b4538ab44c2f2b681df1338e7419e1f2