Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-10-2024 12:01
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sitecloneai.digisprout.live/download/page/66f44762282a3/#[email protected]
Resource
win11-20241007-en
General
-
Target
https://sitecloneai.digisprout.live/download/page/66f44762282a3/#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2676 msedge.exe 2676 msedge.exe 2940 msedge.exe 2940 msedge.exe 4872 msedge.exe 4872 msedge.exe 768 identity_helper.exe 768 identity_helper.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2940 wrote to memory of 3996 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3996 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 3596 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 2676 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 2676 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe PID 2940 wrote to memory of 4004 2940 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sitecloneai.digisprout.live/download/page/66f44762282a3/#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffefe1d3cb8,0x7ffefe1d3cc8,0x7ffefe1d3cd82⤵PID:3996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:3596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:908
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5020
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:3356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,7245754200957807736,9520232874322406675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD51cc78eabbe6f8216a2312e3dfb394b74
SHA100d524ad27524d9fd24909b685a99af7de2660bd
SHA256d00a590e675392844fc8312debfde1840ed4bad78206144b54bcac09bfcd7a94
SHA512d756b7450c98be4ba0c9158e8a885ccedecd729fbf31f592e9132cd148ce64c5383ac067fdd7e00e8f3faa7b9c98929f9ad89573b48a547a6fdc4bf099df330a
-
Filesize
1KB
MD54df75a48d0886ba8b141d92ed87894da
SHA1b18a87c4a52cc31d2e1ea96d80f944841c0c8150
SHA2568d662898a78dff7d10bbbe019bfbad7dd982cf3b90dd08ba76f4ca5123c25beb
SHA512f8c7c37aa5fe6d2adfdc5c90e6885530763898d55d26cc4eaf9d90d511f66ffa98ac07f14eac3e40f62e143e5664e298feb594a665171c954dd7a34876f42bc1
-
Filesize
6KB
MD5cb8db7c5448a47392cba5ff523eca913
SHA1db0bf4093e678d2bc89ff64d5c1352bbf40b4c5c
SHA256a185e3d903c5006d473d7ccf9ca68bba9a93ec50b8b0ca4a8018fd8416b7fbe1
SHA5127201f0f74085d66716a668203a1f319999c0717c882677c289d9acc386a841d5ec76fd83600f48daa5686df73fd5349aa2a59044fae765ea8696268acd14ed2e
-
Filesize
5KB
MD5e53bedb65fea1451e01c97e47cd9e1c8
SHA1ef39e970d29bcad0a04f030eb3c4ae0bcaa4f87e
SHA256ca56fc9d0f0e56b861f6b51b786f936cfb8cd9f2f7f980a69a5776d69b69aa11
SHA51239397973f928d7404423f4fadb686f205d7e09c925f890d7fd978ec9c2e9ad988bb94169c1080e4e2c6cf5a1bd48e6db6a076a9210e233b45cdea384faf7213f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c60f15cf3c8e7f151fc1decb5606e0cf
SHA11413405e5cae27a4d475a6b1742068e269910bc8
SHA256b4594181d9f40d85f74e1b1c2494375a4cf2796209c256f33f010d0378ef93c7
SHA51289023c27e56dc3943c6a56443038409abcfe39f79df89658980419007b1e5b57b99783c9e106df5e9dbf1e949b929074e69c1856b8b478a9f1e62d730eb95a71
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e