Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.superteacherworksheets.com/phonics-ar.html
Resource
win10v2004-20241007-en
General
-
Target
https://www.superteacherworksheets.com/phonics-ar.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 4272 msedge.exe 4272 msedge.exe 5104 identity_helper.exe 5104 identity_helper.exe 344 msedge.exe 344 msedge.exe 344 msedge.exe 344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 2556 4272 msedge.exe 83 PID 4272 wrote to memory of 2556 4272 msedge.exe 83 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 392 4272 msedge.exe 84 PID 4272 wrote to memory of 4048 4272 msedge.exe 85 PID 4272 wrote to memory of 4048 4272 msedge.exe 85 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86 PID 4272 wrote to memory of 3824 4272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.superteacherworksheets.com/phonics-ar.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffe109046f8,0x7ffe10904708,0x7ffe109047182⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14556616598492519287,6715266945951011918,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5f5bbcf27bcec658078357faf30f3c316
SHA1869eaaf911bfc11ee5bf5a55de948770390060fd
SHA256c820a91116606ddc15972a88241590e898a13be72b16656090b5643a652a3b9a
SHA512262848fe3825fd854296c9003dfd6ffef311bf8a1db63b36d227aea1f286a666f80c0e25872ef2b010ae5ec0b4f0b62e90f594ef103bceca50ccac250aade909
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5392f4240e91291a21a4131cf94fd3a5c
SHA176e96d9943db2a7a74ae797e4eeb3bf457416a16
SHA2568a923280652c225d46c85da94f1c965ab656c475f202574621041da8fb284f51
SHA512b50e5f49a8f9ebc8dc52c735bb9e24afa59e5bd1c98f8eb93a48306d70740f5cfd34038270c2c2f8a76dd9af31961a444746dabce6a805d6d6d686ed13115cfb
-
Filesize
1KB
MD57bafbb13cc9bbda4bc85d5cefa3efb8f
SHA1a8229c8c9dbb117c57388e486a5e283483ff9efa
SHA25646216208563b60b05329f60c8cde41698e87dcbec3d03783580808268d0fca5a
SHA5120dc0b48d78d2f701d8586a5a34957b2f33ab803b2ab68b56b17d3a82428a6cad72fee674bd56d174e9daa3fdc52e4c55b4087370800ff5058ba88860457773b7
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5849cbf5927e284a99038e81a3fa28685
SHA1dd9cb64ea60c32b0f0b40c48dd87a4f71945cd29
SHA25669dc20e5ba480f9f54a78cb0b82b4966b7ca584df23bd9a8a3b18c356aebeaad
SHA512868d19e1897105bd33afb19198fc5f43d35bbca247b66e13144e4fd9ea0e3cf053260cb6ecd5951409d2ff1ab5fcb75fed9c0876574599e712b69c4971825401
-
Filesize
6KB
MD51d6d89232e18c65f8d2b9505a8ea3f11
SHA1919e1e441c731df0c2a2a1efe5c5501dc9a7b1b2
SHA25606cced94d2f66bf42c958b626b145429e30f9c1dcfef6e91d0cb4f9c41431807
SHA512d18277e0642a56f1ffba51476a95be0bd58065a1a01c766550ff2b9881b90e81f182fde053db938d1268d579d2befb6043058e04b895389ca1758f7901dd3959
-
Filesize
6KB
MD5992577db34c3c19714641e48201beb90
SHA1e60f9e55a088b2b69611655c77b00ad34c9858fc
SHA25641cd255fab3449b58733b4e07dbe987344cc645399abdd54044e5b038821cf39
SHA5129d7d2b330ed4f316d78c7d390233065cd541a72f71b601df914d34bc00e320d25bc47f593efdfc898f4564f68b9db02f991ef62fc7e11bd7ff8570963e07f426
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389