Resubmissions
08/09/2024, 12:48
240908-p1slwaygrg 308/09/2024, 12:47
240908-p1mqmawhrp 108/09/2024, 12:46
240908-pzzzkaygng 308/09/2024, 12:46
240908-pzrcesygna 106/08/2024, 12:34
240806-pr9h2ayhnk 3Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 12:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://porn.com
Resource
win10v2004-20240802-en
General
-
Target
https://porn.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 776 msedge.exe 776 msedge.exe 8 msedge.exe 8 msedge.exe 856 identity_helper.exe 856 identity_helper.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 4600 8 msedge.exe 83 PID 8 wrote to memory of 4600 8 msedge.exe 83 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 4944 8 msedge.exe 84 PID 8 wrote to memory of 776 8 msedge.exe 85 PID 8 wrote to memory of 776 8 msedge.exe 85 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86 PID 8 wrote to memory of 2116 8 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://porn.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd09e646f8,0x7ffd09e64708,0x7ffd09e647182⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14155235975643134906,7078536329386955202,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5e09a53f96be3f8dc01c72eb26ce0b633
SHA16ebb4308803b69ce5d395f346c6fdc422242cf82
SHA2563de7218c34afe13bbc0018a2a0c586e955e6e6c9ea1fb13c567ec02b57d669c2
SHA5129583eb00dbec3f6abd1426b12657fd5e1557ca815d8566a75bfdaa85ad49932c0cc39896f59d629cba9805611377f1e35956212ac3c8cb3c084cf5b3304e39aa
-
Filesize
942B
MD507ef064d21f1ee1081bc44cedaef198b
SHA190b004fd322e2bea897d31467e26f1e4e2b23e51
SHA256cb94f1cc3c91f56172d3d4113dd30694a89a2c1ae41b16e6c8f7564cbfeb31db
SHA512e382aeae2cfda0c0cf4d8b0bc6057ff2f0e70ea2bbb78ea726825575d482c7c475184464b6fa4acb8593c8fa40d5ae804c7d54873f1fd34e0f1cb167e840a43d
-
Filesize
5KB
MD543c7b85df1cab90f103a055ed7fc9ff6
SHA1c60943e31dadc90a92abc0d29fc0707b0e1407c4
SHA256e5a018ce6c25b81a986fe9b5adb4f8e5bc4efaee95337684648524ddec775c72
SHA512e882c679b0b1a2808fd493aab763a8d4d42d6e75707a55b3b4cc39b72d1551cb9bcd04cd194efd3e535d19303331fe2bbc1cd6f412269b40ed970506e32f9884
-
Filesize
6KB
MD51ef7ad1589e87173c7259ebac340d374
SHA1a1c96aadc27acaa1b72577c9c9c4a5f9c062c480
SHA2565185a06ba1437b91f86512a45603382f39a90f120ce5772a91be8d647cdf1eb7
SHA512803bcc49a213970fff03a10bab41d938de58edd91ba532233c0db99b1063a8bd9e1fe82332f43842ec5fb496be155642099b880c300ff1a72924bf44717bfea8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a288a6760fb8b770654df5b9a2a5fb2b
SHA19073556f8b52625c8c1ffd0958765d80ffdcb1a5
SHA256dfba6533752fa64ac8bf6b06ef1f7027d6b317a2fb04e407c81b47955ec0d79e
SHA512fb08c5f5528b90bc05610bd75053352b684acc44cb3a9239eb1a0344ad84da27e689c78d28075e0daedc0f1f833207262f5e6de9aedd1099c156e35d3f9f7065