Resubmissions
08/09/2024, 12:48
240908-p1slwaygrg 308/09/2024, 12:47
240908-p1mqmawhrp 108/09/2024, 12:46
240908-pzzzkaygng 308/09/2024, 12:46
240908-pzrcesygna 106/08/2024, 12:34
240806-pr9h2ayhnk 3Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 12:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://porn.com
Resource
win10v2004-20240802-en
General
-
Target
https://porn.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3896 msedge.exe 3896 msedge.exe 3536 identity_helper.exe 3536 identity_helper.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 2172 3896 msedge.exe 83 PID 3896 wrote to memory of 2172 3896 msedge.exe 83 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3172 3896 msedge.exe 84 PID 3896 wrote to memory of 3524 3896 msedge.exe 85 PID 3896 wrote to memory of 3524 3896 msedge.exe 85 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86 PID 3896 wrote to memory of 2428 3896 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://porn.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a90f46f8,0x7ff9a90f4708,0x7ff9a90f47182⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4178805180509600327,14076092800920681228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5df6f397c59a0608dd33f6395fa23a70d
SHA14dfaacf23e23dad225fb478ed5cf712861dc2d4d
SHA25627262e7550abf6c99fd5410bcbb2b48771c914eb02f60bf16f8f56f4f2ad41aa
SHA512eb2b43c8b1dff7148d63ef5cecce4e9a24d5a3ef2c8de8885bbf20392ac9dc78b5b4bd4ecc5395944aa9bdfbc61b6dcc5a90f5c29a2a918c7de142ef1fae9450
-
Filesize
942B
MD52837d60db27912fe93b2169bd9afa1d2
SHA19ce228a08d8d68c459f48f197434f5f5a815b7da
SHA2560b04bdbb8feb2ad754dabbc96ec466f219ecd18109ecc853bd18b33d00714392
SHA512b1fcba47a20ed65bf2af71d5ece08978cf42599562496c22091548912f524007757ba1e479472248e661971ce510e32d38ca0e5f5874702ec914b1a8d7f7beb6
-
Filesize
5KB
MD5ab3eb3a82bd86b388a1bdb44b9454554
SHA1aaa347a9f5048f3f0f7f57e20030803532e0352d
SHA2569cdc39302250579419abc710b8dc358dad34e4da1967569715d93bad87937e08
SHA5121cb7694c465ecfec545c0c285df802ebfd2ccda0774aae4640e5a21db2896f7f5845cc4386307f08e627b3020705add9646af46f4330931f2e70cdcdf664deac
-
Filesize
6KB
MD5d42f4a0174b303d82aaa127ad9c16d79
SHA1881e4748685de053d9f4521a23860e9f5b8b5dcd
SHA25661508f97dd76b7becda16bf7fc6ff03f6fb52cb4d06bf1c50e79d575cd7fdae9
SHA5128ed6acc310117563407670c9205fb023f9851a2cf0acdb8d95b6dfa1d8dd3ba1e419d1d9c4421c92679c7614517b455c2d84778865367a0e43c59749dfd52f7b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58ca82afa805d2c03f010e92aad35879a
SHA17bc053c9d592420fc56c5104d8f27d601a136283
SHA25680ce216906c07ec42e2ea38b800e17c90fe3ebfdf85dc74f53709ee008b263a3
SHA5125c2ec7f83ccbd4a00b1cb70eaa99b4cc0bb583b0cd932c0f3832a918a7b4b8ab0e5d47ee86f11c6bb3f02d8619f0e961b8513e1eccb8243d7e53b278da1457ee