Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 12:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://devonshiremall.com/stores/devonshire-devonshire-mall-blackwell
Resource
win10v2004-20240802-en
General
-
Target
https://devonshiremall.com/stores/devonshire-devonshire-mall-blackwell
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 3120 msedge.exe 3120 msedge.exe 4056 identity_helper.exe 4056 identity_helper.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 680 3120 msedge.exe 84 PID 3120 wrote to memory of 680 3120 msedge.exe 84 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 3648 3120 msedge.exe 85 PID 3120 wrote to memory of 1040 3120 msedge.exe 86 PID 3120 wrote to memory of 1040 3120 msedge.exe 86 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87 PID 3120 wrote to memory of 3688 3120 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://devonshiremall.com/stores/devonshire-devonshire-mall-blackwell1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc86946f8,0x7fffc8694708,0x7fffc86947182⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,2570001865784471735,14806424225749558563,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD537742f2cb887f6eedba180afaa3cedfa
SHA1f974c58804223daf4aff0b91c5657898df4dbe6c
SHA2563fca565af4265a30d597a8a77608fc2eea226b8d833c14673b4e2d7ee840c19f
SHA51208212ea95e2dbb98c7a74ded8ec24ce6092e9ea0ae8723ad38a66269ce80acb996b1bb897b3b0a6fd9297abc2c84d24949d4e66ca6eb3b55945ae5625de6a28a
-
Filesize
1KB
MD5a9c3dea293525e8669e1eba6f44fe886
SHA18502679ced09226be4df6e4b192daf85d583a3ba
SHA256c759b67e4c8ef516992f79da6c0285e70bc4a5c7931447becab313f83d8554ec
SHA5125774e126d3d547b392496d7cb43aa088dbb41cb970c6e43dc1f17987bda32e26f30ca610bb7de45c34cf1a96baa7ff3235a3c154fb2385f2d535acee14d3cb98
-
Filesize
5KB
MD5117cc9e68c4922ab3c8edcc1d339a7f6
SHA1a964c7ec8ea94755c8a78188701ae374ef6d0815
SHA256b07ef9df022e37ac4a55c16964302d241de4f392c57bd13cd1bbc3c1e4271143
SHA5120a30df0fb1ba94c9a4457a9385abda289255fa9a90876533ad1541e35a513f1bbb526ff74ef0e1d28c6e58159cf271d138fbe3ce0ad7db46360c8031e0afb15d
-
Filesize
6KB
MD537d52b76869c9052e97866e7121f6246
SHA127223d85d2d5d1b5ba1a11870f5e7a87c07aba6c
SHA2563f5393f45b06163842eed36bb2ffae833cec4cd8aae001c8f4d7de1c2e9a48d9
SHA5125a6fbb17bbd88116c930e6c9c2a589d3a7773dcd44afc28379fff45f7a2394f657e09c980e6b66e8134b1f79e512a2e23846192c0838df616cdbd86686dc6cfc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD531b4650e168dcb70dc2e82c60cbdd0ba
SHA100f68ef15bc0e960abdc3af8689911e115a30b23
SHA2563e27212117c972021764f7e4de13298ac9219b149d67d658bd6987d8728f960b
SHA51290ad590333d407eac7fd176bd111d08528966498716f8f43b049803407dd17346a27800191a0fe471544253469c79a765ce45a12e46a41734a198bd78f4c83ab