Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 03:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://jemeni.net
Resource
win10v2004-20240802-en
General
-
Target
http://jemeni.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 1096 msedge.exe 1096 msedge.exe 2188 identity_helper.exe 2188 identity_helper.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2564 1096 msedge.exe 84 PID 1096 wrote to memory of 2564 1096 msedge.exe 84 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 3912 1096 msedge.exe 85 PID 1096 wrote to memory of 4368 1096 msedge.exe 86 PID 1096 wrote to memory of 4368 1096 msedge.exe 86 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87 PID 1096 wrote to memory of 732 1096 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://jemeni.net1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fffeed946f8,0x7fffeed94708,0x7fffeed947182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2076 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,8191279593181910817,11008378237238925124,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5c325e28ac0cc176a37dc9b1852c68bfa
SHA1ae0cfc5a1131f9a7487fc04e27dc7b10d5a47f26
SHA256dfd4e1bd2b66a4358f095729d4674d9bba105d961c32965990ea2972f7cb0379
SHA512ce23646f6975878e0a09225fb894cd542ac1fbc0874e866e2ccc28bdbc8c560ca13deeac052277dc3d1709d3ed06a0b5d2de0412b5cc3e5438a02e855185d232
-
Filesize
555B
MD57a5ac7ee7d1d8f312717154a4fcab939
SHA1131904ca5a0e84c09cfd43272bd22b649ef83590
SHA25688b63d9162d447fb292cb4e7daebd4f0b5f63922c43e157913adb8304a2c7c8a
SHA5129658c7c0f89e055c014d886671ff884881c077b1d52b775b4a3bde9bf89226e1b43fea99b54c8797fbd23e716dc8a9c884ef36803fe7c37d86c1f42ff8cb7872
-
Filesize
5KB
MD56004c3961dad517463bd6ca925c355ae
SHA1059863298d8a8c004b2335e6c720ef927bbecb6e
SHA256ffd16e5bca99a4188b850c4c103da57445f184a97b42f44469d6a465ce55ca53
SHA512450a270e6da21656791e5329f8dc51fc6b879ef661cbf4b49c3a5470200a3c92bfed7ab49e269e232bace79c1f95162864e4d7e987c127efe2e23d5202bbe3b2
-
Filesize
6KB
MD52702ece96d13f3038374225959d98fba
SHA1452ea34bdb07852dde1ccf92401bbd9f8de7e1ad
SHA256dab82d17d6ebcff60f98859510f4e8f0cec54e1d107069877e8a01fe77fa25df
SHA512fcfe2050241326f46e8a057300c5249593da47ab1eaa18b157876b1f6b0d4f40ecd71d8af06a2b19f343ef4b0b3d7927a966e1e9b31178c4319813facd1746ee
-
Filesize
6KB
MD5e6a4b016a1cd8b866f7f1362b00211b4
SHA1e27c08795b30d938b6daa1e8948229ed7fad56cc
SHA256549290cd1a0289b73115a50c19ddef8d8526befbced31c3b170fe69c82d2b806
SHA5121f4ce855e7eebe6945e85afc8ce9e7dcb2d1133b406faf73c65dffcf3a9a1bbbc629b5ad747a73ab3f16a7ad22236f8c14946f536aa2c5f96300d13a25577d14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53cf0f34b27826f29a91a8c7fbb630f3a
SHA1904c46c4051b596f486a84473d3cfbbb95d24185
SHA2563b561665934d51b064d19434b642e6310300430dd475f395f928efcc20701403
SHA5128a51a697861ad0cc309a4dbbc3bcff88044a646fb4008fc64da13300a476ac3cda8c6de9e181d3403d42d493105686f30342c267bab27fe81d910262e6221ab9
-
Filesize
11KB
MD53bc8bb4c3cbfaa49874ec7dd9e281243
SHA1bd5ceba5f0f4b9318fe430fa4550354676e5e05f
SHA256b77cf348d18353c651ffa535744f25d1edef5df730eb73a10403f9941560e7e7
SHA5125ca740fb68d3e9a3ecec99d38ea4db028e53377575a2d0871d79cc5e11c82f5f77e4b1b05afb39bfa45980336651acfea5e8a24d4bb3f29b98480b8e7639f402