Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 23:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://s2b-degroof-petercam.didier-vandenbosch.com
Resource
win10v2004-20240802-en
General
-
Target
http://s2b-degroof-petercam.didier-vandenbosch.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 1736 msedge.exe 1736 msedge.exe 712 identity_helper.exe 712 identity_helper.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 3036 1736 msedge.exe 82 PID 1736 wrote to memory of 3036 1736 msedge.exe 82 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 884 1736 msedge.exe 83 PID 1736 wrote to memory of 2276 1736 msedge.exe 84 PID 1736 wrote to memory of 2276 1736 msedge.exe 84 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85 PID 1736 wrote to memory of 3484 1736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://s2b-degroof-petercam.didier-vandenbosch.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa928946f8,0x7ffa92894708,0x7ffa928947182⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,5575872688082694136,669763289541290227,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD50119c03ca4de728c0963466bf7af6dc4
SHA107d8020fc6d1a8c93401e7d9e34f26ca5863be76
SHA25673f82671c5938b14239d0d43dbaa45e01191d45a91f15c70705794b4b1d055a8
SHA5128079432b51137d10eac7bc247c922a38c14261bd9a725652be7a4e724803e6a1ec31d612cf3316afd8f471026d6beb0a9642e92e2b040d069119f402403a50fc
-
Filesize
1KB
MD5fc2f570b6fc3c94aa5c53e89f9a967a4
SHA1f11a25b64c9b757c45beb82342ce63cd49e71595
SHA2565837154d8fd920fd4f1e3fa8b7ec18d8789d01b162a9d89d9f8a271ea379f311
SHA512fdbb2fbb550af8cf49459e46e6ed2eef60c3268f76ed661c8fdff34f088d13af07059e0c6d350faf7dcda70221b9444b492d5c493229ed052041e68d8632e0d8
-
Filesize
5KB
MD563e36a7147eb8fb9909c8c96f835edc3
SHA1d48c18290e1319930c23e8c016de220b732d7365
SHA256ad318aae4f3b5e0f728907cb0452bd73262349d1f4448700a217e72854d510fe
SHA512466a9f20ecc06a50ed90bc96c35157f3b5eeec1cf211136a6038c9d3bcd6a2cdf5b2d443445c827e875e97d11e96e8d7630ecccbca3eb1846105b22d7a1fa009
-
Filesize
6KB
MD5cc9c5187d4d6c35482d54f5657803d1c
SHA1a1e6481c44372f5e66d37a49550529c83a50c81e
SHA256a87af63f9997591a2f71d2790fa633ad2d76a6777c2e95a25373045e481cd44d
SHA51267ed71476a303094a67d3b35fee409402c60e9c545e49307fba29ec8757421452f9b206cb857438a2b1692a56dccdd5582fdb75e926955ceb013e8591f2dd74e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD568a436e9c022d361a54d7a64b816050f
SHA17fe3c06fb3a4890c07198c1d39fc9190d62a2999
SHA25686a1b40c6830eb73b026ee07de707a60de9775dae4e1d5e2dd60001457ecbb1b
SHA5128c4f96fb110af4a182a111b23a3092306637914fee5599f643ec72d91df7349c0b6096531337d3a017196ce1acec8b42af093185a686e3a3719b0364d9fbdba4