Analysis
-
max time kernel
242s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.swift.org/
Resource
win10v2004-20241007-en
General
-
Target
https://www.swift.org/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 672 msedge.exe 672 msedge.exe 1412 identity_helper.exe 1412 identity_helper.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 672 wrote to memory of 2964 672 msedge.exe 84 PID 672 wrote to memory of 2964 672 msedge.exe 84 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 4556 672 msedge.exe 85 PID 672 wrote to memory of 1776 672 msedge.exe 86 PID 672 wrote to memory of 1776 672 msedge.exe 86 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87 PID 672 wrote to memory of 1248 672 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.swift.org/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1fe846f8,0x7ffe1fe84708,0x7ffe1fe847182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2985047551397927897,10769779943477353621,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5c6b4abd6c20938e9d5558021fb2d762e
SHA1e41ccbc8885a86127b843c0489203ce4c2ec03ea
SHA2566123774e1b92e1f6d514e5c3c0ef4b68f006af0331a4d4eeac0c4553b94d3752
SHA512bf93867ae1c46cb8e3927cca1eddf7a36f8e666a6f3c29524c0486a286edef514ee7ad80664f4785d1f0755ccb922d7fada06ae7e4c9dd915cc701e98c058dab
-
Filesize
191B
MD50d282d08095eb79b1cd5a71f6ab5e257
SHA1a4e68dce512faaaa5df70e25fe5169c3fd6e7322
SHA2565a59c257472c8feb0773aaf29b8745bf90e5f74acbf907c1dd5f1601ca636627
SHA5127cda8847aa3374ceba16a26e475b735a9e535d7190046b0ee5bbb365eb3434a16e9357e6c4c65c1682da1c36d81370fbacac8c4c562cd0d88f93b91a85935be8
-
Filesize
5KB
MD542c7cb339b40281ace89f1f755024546
SHA12eaa41cbc77aa3081879675a7c94523ab33746a3
SHA256eafadefed9df78f354289d320ed80b52590c564270940465124c86755756871b
SHA512cc98478ee125feddb1ba288aabbeaf0ab659254a3c574c82a0cc5717998206e6d6bd1b0927453c5da1e4dcf5ea65c060f1f27504a5fbcc0e505a005a2afd7717
-
Filesize
6KB
MD5d154ee94325caac288dcdbad1ff6a1da
SHA1b429a3f6d272bde87d68ca2d45fe23fa666d1e10
SHA256fb51fa88d934142fc35763623853c4100e1eaa574e470bc3b5f69745c5af91be
SHA512dbbe59e73a924f8c7fd04642e4c8d148fab600c1b5d6aded1f6f73d14c9469e81ebdf819f505b0fa31eb1b8d29b1315eda1a06729b8cbcd745ef2b9d88d2a61f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ea57b7410cde5b64ff61179167932ee1
SHA1e14a61f1fba1209ee41c170640de3936ea8a6068
SHA25652d67c3d03f051167da38e7b20a57d9d073c35aef3a703fcc1d05fa859635c2b
SHA512d959994bb80283ecb54fb48ce66904191b1415e1e4d9b030404cd2b466fdc43ad386b82c1677f97738cdb50fd6e3bcec8180e07af4ebf5c6957ed0c2f8291e64