Analysis
-
max time kernel
61s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 22:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ulvr1dztf6.acoriritto.shop/m/script.php
Resource
win10v2004-20241007-en
General
-
Target
http://ulvr1dztf6.acoriritto.shop/m/script.php
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 3200 msedge.exe 3200 msedge.exe 4728 msedge.exe 4728 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4728 wrote to memory of 4668 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4668 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3040 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3200 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3200 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 3736 4728 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://ulvr1dztf6.acoriritto.shop/m/script.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecc0146f8,0x7ffecc014708,0x7ffecc0147182⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16163594467391629464,2445473068711708182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56e3c35f208ed129ed016dda23f0b336b
SHA18097516e115ec1eded19e76630658081e4307835
SHA256f124235ab44c393c5f783a1246278f685acf28b4b29def1a4a9b81a0d6e08cdc
SHA5124c626f2478bc21dc808fb3313bab3b57c7b5a206f349db3e6aaba6cc6232bae65b921c8cca6fa63ef1d8ee08aa957471df8b7c69757de7c4328fb0198d1568f8
-
Filesize
5KB
MD595f319dcb5541b4215949f5bb3f00f0c
SHA1c862588a8253aed508307bd5e70137a87858c5a7
SHA2566718c82ac92ef14f42e45a121455589d4703cd18388b2b1a37fc99fdcb1eecbb
SHA51298712d6677a8d2a04361018bb595480d430ea055f0881c2542620de89fb036487ab5ba4c5728dbf61c65f5fa705b01896bd0fa574acbb210f5cbe91c4650d8e6
-
Filesize
6KB
MD53b9a3ef82905d8cc6d63f1cbda6b3897
SHA184f2fdfdf4140c6085d3a5caae06dc20559c00e4
SHA25604215e0a040e36b6a193764b24b591a5305da1b6ab9e9414b3892b2747206e82
SHA512620fd0cfac768538629ccfbdfeda41508fb1bf35b454f4ef412b5b8e1038830b44f2c71044e0ea2e025a3c46a53e71efe3bcd2b794aae52865897d3e8a743d76
-
Filesize
6KB
MD52852a96a3324598afab7a1f1d78655b5
SHA1cc1b472b04aeb19b927fd290ded8363c82ccd26f
SHA25677e267f13eb4b2d8e3e7d6e1d1848356b0b6d934665c1658da183926af6c2cb1
SHA5129d24ec8b6c6aff0d9319b218995257b295813e0af5837bfbfc74bc54c33e753917cb3b1b15d270db4a69797ed2956be07fed818cbce3dd4094259f133eb10b5d
-
Filesize
6KB
MD55e9f0a423e2b5f670b83dbe416d86fdb
SHA1829a5acc73d10a79a18a2b0cf21055cb3aa8f731
SHA2568a98c6f84bd962f5123aa448fa1ac127d6c896b5f249438f9f8c45aaa9c4350b
SHA5125f4a6dddcfaeae0bd887da16bda503705eb6582493d3d5ec52af1cd7b72108ce901bfc58c93390e7020d89cd7f74db272d116989e0169c2b5518fadc99f91184
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5eda5653f91904e1200098238baca483e
SHA16feca4a12736902996ca1f1f4a0f74300e95dc34
SHA256dba13f6b14acfc0f1846449a5a9c651886f17b8a9e9feb99d2d6ceb7eeab6059
SHA5120084301f02561f61acd3380a1334328c403f923ff31063709bef11b920aa6f15d08003fd9193f11b0ac2d3240a9ce123b16d3513eba16004ed75786aedcf64e3
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e