Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2024, 23:28
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s3.timeweb.cloud/fb44dbf9-new-york-times-news-donald-trump/iranian-agents/Donald-Trump-Assasination.htm#[email protected]
Resource
win10v2004-20241007-en
General
-
Target
https://s3.timeweb.cloud/fb44dbf9-new-york-times-news-donald-trump/iranian-agents/Donald-Trump-Assasination.htm#[email protected]
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 2592 msedge.exe 2592 msedge.exe 1700 identity_helper.exe 1700 identity_helper.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2620 2592 msedge.exe 83 PID 2592 wrote to memory of 2620 2592 msedge.exe 83 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1800 2592 msedge.exe 84 PID 2592 wrote to memory of 1376 2592 msedge.exe 85 PID 2592 wrote to memory of 1376 2592 msedge.exe 85 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86 PID 2592 wrote to memory of 4740 2592 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://s3.timeweb.cloud/fb44dbf9-new-york-times-news-donald-trump/iranian-agents/Donald-Trump-Assasination.htm#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f7dc46f8,0x7ff9f7dc4708,0x7ff9f7dc47182⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13434861033227616772,14646731400273284229,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD54932b7bf3babbce98d30a5fa0d919398
SHA1ff718ed88f73d288352aa1640323604dd8ceb999
SHA256225b8a6ae37436df4d08324635472cb074d5e8e35ffd69502894bbba5c23c83b
SHA512455f2c6bfd556f3f3598dd1e7762fa0998ced411d5706e4c9ab9db77c62f72464e53559347db43ce2fb268746631fc62cd94da36bf4c41286200604d397b5054
-
Filesize
1KB
MD541062ee091fb0f2c240ac21186d3638d
SHA155198b240e84e5ae8101767ead53cce0da97b20e
SHA256d96d7e56e1ed23cd1fc4027053fd394978f11f53de3134a6c7a0a1b9febae858
SHA512219a01e744b84f5e0690bc16123164a476e59e3be2d32c28b75fbd48ef54e6ebbea47feb01947c1df1b362415fd9461a232e4cba272308cd50b94c677795336b
-
Filesize
5KB
MD52333f56eaae3b96d671b4cfeceb0485d
SHA145b55cd578de2960c77c1aab014cb225e81c5e16
SHA25657f77fa43c2aa274b6273c47f474fbb68e82ef041b674a87a16c7a48f5a5e67d
SHA5121b1dc8469a9ad0c5deb590605efb00e13a64acbd697fa157be64ac63cac86050009a73d6141b30c3ab656e3473017ed89e66ce2cb664675f1f4989b883c9af3c
-
Filesize
6KB
MD50eef9a24d83932d685def8eecb4fd543
SHA1c3fcb2b0c9b8d7579f8271e539edf8637517aebd
SHA256d021c07d50f5f247b3bd57d0b531f2f3b5b283a5bd3a0a6b36502cebba28e65a
SHA512cc6b404ac337df1cb0521226930cfab12356f3e4c6812b666b859a9fe3cd941b6c563c0791eff4e808cd97381c9a8b58aa2a1ceb3d4d513f7bbda6d7718e83be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51fe08db3f9becd2d34bbae128b345a36
SHA1c155b53a1b72013f44c6beacd98ca6b4163a0117
SHA25658d2bd7a0e32f79e08609806eb33bb4d29d2a96f6e94cdd37e6c1a1b4541f297
SHA512f2ea225b9b5dcc9ab77b41536f61df8755d23f58b7423bbc5a5a34d22f8397d405f903d2d8e06f03fdfbf91bb3b435cf998c7d12bd875a0627f9218cafe9b706