Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 14:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://onlinewinetasting.club
Resource
win10v2004-20240802-en
General
-
Target
http://onlinewinetasting.club
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 1140 msedge.exe 1140 msedge.exe 3984 identity_helper.exe 3984 identity_helper.exe 6040 msedge.exe 6040 msedge.exe 6040 msedge.exe 6040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4340 1140 msedge.exe 82 PID 1140 wrote to memory of 4340 1140 msedge.exe 82 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 1304 1140 msedge.exe 83 PID 1140 wrote to memory of 3904 1140 msedge.exe 84 PID 1140 wrote to memory of 3904 1140 msedge.exe 84 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85 PID 1140 wrote to memory of 1460 1140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://onlinewinetasting.club1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,12837405764448498474,14094886611055078017,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5e66e39384c1ff3960619b46c4bb8fc58
SHA1e92e3ccdc441c398b2085b203a0550ad9fe2580b
SHA256be9674d40a1da8e82a6c727d3f6ba32a803b5416356f54438f8da1dedf606b59
SHA5125f0229ba1998af6cab67566e4b0b60a98e758b2470f11ba9eec4f9b86a237b64ae1f052042f17631b6e041e8a5e0cbeb5d1d8370616ce8e43f043f1a8e4e435b
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b9a1c18b38db4220b8390fe757bea5ec
SHA138d690d72b141833caa01b5abe409979c1814df7
SHA2568f8f7dab495c26d27defba8b89c51bc227a2ae78c027f6d8920a902c2f134a43
SHA512944cedd4a07f684172f6510c72c0ad8e5f3b389ffce4c8875a34fea0608e67c28c8b6dadefd7f33c06427bf27a0f45647d929a3262e5632127d90a829eb1761c
-
Filesize
4KB
MD5c8e308f1583a1c2f878dab90bc1858fe
SHA1ee7a529f7f22ab246f8b56383b5043ea3b442879
SHA256f06101b15a2dabbb22a13ce68bbdc98f7be4ee4055733139cda476d4be0a2d9a
SHA5127381de3b6766c5997fef92bdd269e157df4b6f220c56e9c7d4d4b6d8fce50d2b5fb1232dfc3ca8f4bc00bdeb7730bfbf964bb9134884dabd579967774341f911
-
Filesize
5KB
MD514a98acda15560d73e4e353bbedb8f40
SHA113848e83d8cb2c3abfd05559bc20c7b22326dcf2
SHA25617ad6d6301a82a9f9eba0786608a451e282487939f4e67627dd0b6c489bcbf8e
SHA512cffad819011761c71920b5eea42a9b5f7f11d095553c5d2af35114a0a64a7eb05af88833257dfec6c21f40c5c3c9387a62c2d0436f14a5904029a4786af4d1b4
-
Filesize
7KB
MD5fc66bef8ce1a5cca836fee2c4c2b1134
SHA199b10cc1c15c3aee340ed1731bc7dd6c660bafa5
SHA25633423c8971076861b9dc320be5e204d7e06e09ea28ad5823967a36941f8e277e
SHA5128c70de7c602e7b823ae9fedf85b95436019028d6334790ba5c2b945a94b4229bf6bfb0c861878cbdc8ce0b72c7ba28613ad2d19e790c8437bdb15292daa09980
-
Filesize
1KB
MD578125de094194b49200f2e0770816f7d
SHA1952d0bac19c0447dd7bbf555a544e45bde24f085
SHA256e9913ddd847d0fd03c911921cd1f3be8fa4e45ef10c489b118dfd732df49bac2
SHA5124e92cf9e0882e95eb346848816dd94cb13e2a1ff25a7618dd0aed780e81122c1a67233d554c8964ba3a32a9f284797b104c87a38afdc48addaa55120ebfea127
-
Filesize
1KB
MD59c49c33418f8d22ccd5dd0a879e520d7
SHA1df7d8d5702236ca59693b1d8ff2871f534f6e477
SHA2565a6c1ded4b1d312c5021c755d781a28007fe4163e4ce7665d08679d13e1628b7
SHA512cd215e6ba721c32753569f01c96a2bf2fe7f350cf9c793772902abed8a89fe75ac922317eb6e16dc827fe4d7ba751dabb388dbb286cb5b932c2b7b7273f2001d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5584f786828133871f462aaa9a939128e
SHA1a5900f8871287a8cfe76dc9016464649fedf2d86
SHA25608a9706574e4b4c7fe7df8cb5452438740e1d8be425d5c0b8cf1e04e1ae89488
SHA512447f625003eed623315ff52114598e476d473353cfa753e8d0415c1522c9904309eee686eb9d6b6441382c9941cf130267224085701521614575d14d6d15d030