Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 07:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dibsemey.com/pfe/current/service-worker.min.js?r=sw&v=2
Resource
win10v2004-20240802-en
General
-
Target
https://dibsemey.com/pfe/current/service-worker.min.js?r=sw&v=2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 3504 msedge.exe 3504 msedge.exe 1544 identity_helper.exe 1544 identity_helper.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3504 wrote to memory of 1156 3504 msedge.exe 85 PID 3504 wrote to memory of 1156 3504 msedge.exe 85 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 404 3504 msedge.exe 86 PID 3504 wrote to memory of 1952 3504 msedge.exe 87 PID 3504 wrote to memory of 1952 3504 msedge.exe 87 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88 PID 3504 wrote to memory of 3080 3504 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dibsemey.com/pfe/current/service-worker.min.js?r=sw&v=21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa47c746f8,0x7ffa47c74708,0x7ffa47c747182⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,13168606768732068891,12048067787953998410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
180B
MD5b97c2e7266cbef647f5076ee60f749b5
SHA1bdcf8cd8c7f85e9e4db05cd6b33ee12a00b0ba61
SHA256f16cdc154ec02f1a97cf0cd41aa81bf6a1017e454e0e10a72c93a019fd1b3cba
SHA512d27a502847e41181f159da5d578b1fb996c352397b52097e36d1b05b03a4e0887491d455716beeb039a6dc846228249b66467dc679ca466b934d712e3b8aff56
-
Filesize
5KB
MD58aba63e39fe3ea4fab6056c4cdf8ad72
SHA16a47845d4467346860128086068495426c1f1ecb
SHA2564d9899ed46950fb5fda417ed037cb3ec05f205f62fe3e44b03b2f76384624ffc
SHA512c2ef42d167db200081b66fa72709529ca34fb927920c4df3c36b83d04232dd7f225b1e9419816682e29190dcacd5744a1e6f044317a7af8d5c3f15003ade94c6
-
Filesize
6KB
MD5c641d30256e7eec4efd26333e6db702c
SHA1e0ca582b8de0d8522cee1646b63375c103e2001a
SHA25611d15b4154a46440b72c9a0a3b4661ad23a42649eab56402428cc5b32c96c0ae
SHA5121925d40e2d046c1463c4fe3ed91f7810adb4d685a08347fd390c709484903e1dc67b63cdde13f97894a2a6e09337d6fc045375360a52e1a9f585475b6d5cf31e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD509d8f410827bcc4a72f6c07e20a69c0b
SHA1aec4f6e458b080a164688d0bf7b7bee61e3d81cf
SHA25686bca9254f33b742c1f717281ef30ead088ae6613bd42e7aaf9f38b7aec8faa1
SHA512f6a561557b5c00cb334f22034cf383c65856fc5e0e49d745fe94307ba8e5313ed71a68dca0f297bea601c65a04293c4c3647e420ba1feb84f6c2764d0ae9de22