Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 04:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://savitriinterior.in/DER
Resource
win10v2004-20241007-en
General
-
Target
https://savitriinterior.in/DER
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 1948 msedge.exe 1948 msedge.exe 2084 identity_helper.exe 2084 identity_helper.exe 2284 msedge.exe 2284 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4336 1948 msedge.exe 82 PID 1948 wrote to memory of 4336 1948 msedge.exe 82 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 4816 1948 msedge.exe 83 PID 1948 wrote to memory of 3620 1948 msedge.exe 84 PID 1948 wrote to memory of 3620 1948 msedge.exe 84 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85 PID 1948 wrote to memory of 4200 1948 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://savitriinterior.in/DER1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff575746f8,0x7fff57574708,0x7fff575747182⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6469235745462830487,13999305099119165170,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
582KB
MD52716284e66815d9f5574c0c4db4fb139
SHA14187b1400b76e570da0840a0709f5f3cf97da4f1
SHA2567cd758a16783186d88ac8263d7d6cdb65173f0fc02e7b98455be30cf7aec6fb3
SHA512417ec643fdf7c681d4926c2b1643397a09219a325729acbb33eec5d82e92f24b3fc47173468eaf23eda149b08a4b0158f39f1fe10af9b58fb6dbcc6506bfcbd2
-
Filesize
260B
MD530fc11e17c7c05eabefec66cbf1545c0
SHA14b53ec65ab27c2db5b53c3741c2fdfcca5f4ea10
SHA25658368ca3d1f4910dcb863751a44a222f62d8dfe42557cb4040f0dd90fe0ff8fe
SHA51209eb003867dda0c76d0d2952e3986c43a905983f3c8ff1a5900526b438cdbd83f7796d93facb228228590586019888362fca326a9344b55544430921720ca707
-
Filesize
5KB
MD5023f6c1ccad23a782e74877d95f4dc4a
SHA187fcbb98a7a98e304ad5e026ff02a8b477f8988f
SHA2563561f7b6ee675ff81d66d89ed964db0c1865195447307c17dc92595b407f0186
SHA51269680b17c9bd671bae3861cc1da92170557e97aaba68f970c319b692f9aaf0ec6762b3336a93dc8dfbbdeef17f0ec7cae46a74a7154211be442bea94b1980117
-
Filesize
6KB
MD5e08f2ee95c2ba2235dd64a256815a78a
SHA1f7225725f3d2701589071ed7e193e7c6481b724f
SHA256ffdd6ddfc611d79b322cb377c2a357ebaf725ae55f5d7682fdb2f34bbfe83c10
SHA512a60b17920067b203a56580e1bf0603a5a1dda04f210371c1aa7ce27015b3a6e949c38458165b372af0f161bbc45cbe2fbc78180b69bfa6f6c38ca3d95942016d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD593f8553982961c7fbda23365c0bf8def
SHA17683d054ac49876f5c0cbea6dff96ec8b39a5352
SHA2561b12e6b265ecf80db954303f219120c1c5e6e6c2102bd28dad9a7c015ec11d0d
SHA512699ac6411e377d1b8959c3639df0c9b14058ce98e12483868a61469abf373da4018649d94264d652dd726fa082aca1637b7b19e9deeef8dd4812fb3ff9a1cd5f