Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 18:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ouhouhsami.github.io/online-spectrogram/&ved=2ahUKEwjkmr6M5vKIAxUgSvEDHZR6EzYQFnoECBgQAQ&usg=AOvVaw0EpPz3AFBjVoxkdaTnIsk7
Resource
win10v2004-20240802-en
General
-
Target
https://ouhouhsami.github.io/online-spectrogram/&ved=2ahUKEwjkmr6M5vKIAxUgSvEDHZR6EzYQFnoECBgQAQ&usg=AOvVaw0EpPz3AFBjVoxkdaTnIsk7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 1036 msedge.exe 1036 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 400 1036 msedge.exe 82 PID 1036 wrote to memory of 400 1036 msedge.exe 82 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 940 1036 msedge.exe 83 PID 1036 wrote to memory of 3544 1036 msedge.exe 84 PID 1036 wrote to memory of 3544 1036 msedge.exe 84 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85 PID 1036 wrote to memory of 2640 1036 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ouhouhsami.github.io/online-spectrogram/&ved=2ahUKEwjkmr6M5vKIAxUgSvEDHZR6EzYQFnoECBgQAQ&usg=AOvVaw0EpPz3AFBjVoxkdaTnIsk71⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab4c846f8,0x7ffab4c84708,0x7ffab4c847182⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9114206036257642508,3668624264589518307,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
188B
MD5ac45ab8f483f49d7cce7114c62d2fedd
SHA1526ab0cb1150b57fe5312acc8daf2083939eda1e
SHA2569c3dc287934240a0e314cb5083c14eebcd470fba75a953a0e260718d2591bb56
SHA5123cb519a6d6e412a73a10d94c7bd8cd31d3d507b469b8e1f74eb1744f26b51e5d1c1836d7c688cbfd5421408ec106bb841be9ced6b74fb694df320e7fd071fb00
-
Filesize
6KB
MD5344265fa43c040e456449af46da21e0f
SHA10e9ba2df3117e2f12e6eeb311c7f426425fc1b33
SHA256135ddbcd4eba4403234a9aee544f2cb374c2432352b315b2ad56857eeda50826
SHA512f34b23bfdf143dc56c7d0b0af6ee96b454a542d3aea8fbeb69ab8f3462b1841f9ae7e993e369d61770039528351ac215ea73c0bd97177f44fe03367b16b060b2
-
Filesize
5KB
MD550b84fabf1d8bb70331cb8cfb3b7792a
SHA1d383b6c7087f140eb5d64d7f6162769310da1d1b
SHA25643a38d28779edd5469d626f4da3a424a73881bfe050805354e33a984b71bd3ab
SHA512e8b0e09e6112fe682a02d4f51de16c407e8730e79143c07b23efbef419c0e444b38f2aa9ac4e055511f76f47f073ae0dbd7e181ab34b862676a431ba56664390
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b3adbede41aa0548494587ccffde1ff8
SHA1057e2af467bafc51d717cb4448d9d283a5bec9c0
SHA2568ed53cfe20557b1de0b3e0ef5584e0fa5d0e75740894e9a45b4c15244f03f49d
SHA5129e5f1524eb3c8ec85797943f64cb4b1392247a4f8fbb4f657d9641b152bcbc4861ba23a6e1a70b3bad510037217c4aefe556a66bd44e4508384f98eeb344c427