Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 17:38
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sewa.batamkamera.com/wp-includes/IXR/1service16/makingofmen.html#[email protected]
Resource
win10v2004-20241007-en
General
-
Target
https://sewa.batamkamera.com/wp-includes/IXR/1service16/makingofmen.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1072 msedge.exe 1072 msedge.exe 1012 msedge.exe 1012 msedge.exe 2472 identity_helper.exe 2472 identity_helper.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1012 wrote to memory of 3664 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3664 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 3684 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 1072 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 1072 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe PID 1012 wrote to memory of 4956 1012 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sewa.batamkamera.com/wp-includes/IXR/1service16/makingofmen.html#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd317946f8,0x7ffd31794708,0x7ffd317947182⤵PID:3664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4856
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:1608
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:1728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1315229241237932210,448801707877553302,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5644 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5b1b989914202061cf2fb3dd8c86f717e
SHA1522ed1a824fc460f5f2b58f65e5880f80b9e1290
SHA256ac8b8c0339cf17f9bb0c22c72460d658a0c760600ff48e9d92886081450ad877
SHA5127aef32179de9fdc4dd6e4039e795200205a14102b539da8954e90beca4556b627821abc4556ad1e872076387e22ea529896dabb76173665aa15b2a1fd4d5479b
-
Filesize
1KB
MD5282bd57ee504e9e572ea0ea093c1474a
SHA147b6de685739ce157099756a568a499a67ec7d41
SHA256d32160df21d92df83b1b710d4178515ce0fda9ab4d04920396d6b1c8e1cef7c8
SHA512996505308ea3935c991e2158b9d5adc88607e00585806c0b936a5615966d17f91da50d006b1e067d7f5c4e32c6ebf38ff71522d14803d24d568176b2a49927f5
-
Filesize
5KB
MD557293e35818e6c6fb9408bdadd5e7972
SHA1dd44469f3fc6fda96d2c600d6d5a3e87b622d184
SHA256bf0ca8fdf1cb522a87108e7d924a5f6cec379c69f64c17826fdb227e2f97bdef
SHA51210371f9a58be4425afcd922d6f7deb966cdbd3cd08bd5e3e4307914ebac22872743e9708843f01ec60d97989d89a2c8003e61ef6e65e94d36ef092224307b3ba
-
Filesize
6KB
MD5dc69bbeba70fd07601eb721eac5e24f5
SHA13babb114d9e9ac78be0ef6261dcff6046e1f8c37
SHA25652e1af71f1b924db36288f05f0b15452d8f2ee2835eff7c937c4abcde25a134b
SHA512c94cfea4dea274c260c32413463fe72117abc8b40253c31b573929e4072dfdecbac8eac8e4484fe6f017ec8308dcd034c0de3ab147aaff77b2389d3f17975a5c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5f2a86bfa7611bbf555608acd23db1fc8
SHA11cd81d270af8ec2338aa302ad78a1dd314fcf370
SHA25643f7c7c17beacf0e396101b993cd7af4a2ae6dc77205de285b41a31bb783fddb
SHA5123df5fe240f645a6d37b9e0feae7e16325b3cb6cae6741bd249720a2a6f173ff2d722e0248a852c91332c81ce7b45789e91f27e5554e30b484b185bd7c3c1e0cd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e