Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 23:07
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s3.us-east-1.amazonaws.com/us-east-4.consoleprjoectz045z/index.htm#[email protected]
Resource
win10v2004-20241007-en
General
-
Target
https://s3.us-east-1.amazonaws.com/us-east-4.consoleprjoectz045z/index.htm#[email protected]
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 74 api.ipify.org 75 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 1184 msedge.exe 1184 msedge.exe 4092 identity_helper.exe 4092 identity_helper.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1356 1184 msedge.exe 82 PID 1184 wrote to memory of 1356 1184 msedge.exe 82 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 1968 1184 msedge.exe 83 PID 1184 wrote to memory of 3812 1184 msedge.exe 84 PID 1184 wrote to memory of 3812 1184 msedge.exe 84 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85 PID 1184 wrote to memory of 4236 1184 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://s3.us-east-1.amazonaws.com/us-east-4.consoleprjoectz045z/index.htm#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff998d246f8,0x7ff998d24708,0x7ff998d247182⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,12971475381467813727,4880103485522584191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5f01126da4c29ad380f586989e6c8fa09
SHA1d82e8ed52ded6d7a38621904d9a20bba675f4d4b
SHA2561864a1790a75946dbb839455b998abaf5c8dba82947a486a0ee336bf443febc5
SHA512a9caa43052a7961a34584099229db713571fd0bee5911f2bd270c32e998ce38080b7d0302584d23d1e04696e5ec560a4e4ccded1e2de2af94d3d059cf048c578
-
Filesize
1KB
MD50e7bfe0cbf036e1f96fe0028a6b510c0
SHA1ce3155d864ac8538e7202f6bfdf02570b5d41065
SHA2561fbc3519d26f335637137131cb40b406e3ffd8cabe20a9b38f98b73384a91589
SHA51275ae131c64423947eaac21695f5e507d3fe96ec8c6ceace9c6e353ae942bfd7de14e757ae346c2dc89e424608c122b9e3afec9696904e011bd706d826f370088
-
Filesize
6KB
MD5b2671f62a98ef3099143d22cc91fdaa9
SHA1a6ac77ec8411f5cd218ec0e7f0d8b0f5d95a754a
SHA256101429919bf6c78d270ea59fbef624b91bbc83dbb19cad68d5ca1cad176aa575
SHA5127fbed0773ac89a8b64370c15bdeaf4289e5157273a4dd5e98f4c249ad02d759c8ffed174f81fc75eaf385ce8203a6aec146258458dbb050aa22cbb6f615ec7a7
-
Filesize
5KB
MD5d71a4a133d243037d37240ded1a38cda
SHA18f3b7e5b31aa163bdfb015a772a0239a42db6f67
SHA25690fa33f2320d9be6aaaacdd53a6ed11455ef99dc5012d2066af5e9f10394eb79
SHA51247d6186c25e318784f58e4e8189183cddb2bca0e36329d2d33d29898ef63e55a49e8ed09404ba31247ed6b966bdac48a6c22d5272a59b6afe82a38fa99a896a9
-
Filesize
1KB
MD56df7608d164f3663f45f1607484d6e4b
SHA1e1900c4f2d4b62732674607fdb71a8edf918fe52
SHA2565a757de769fbab0127fda0bc3b70d3ec96d6a92ccf4fbc7bcb82570c2f659550
SHA512353109cd314f2dd5bb4f91a0c519b653e7f240c83ac74e12003162d94741860f533806e913bcd606a5fb16dad7b46034e8083984ad7cab469215264523086b44
-
Filesize
872B
MD50318f4aa4deb7159d982cd3784545e95
SHA1307d21448cc74737c0448b2a04856b2a31cc302b
SHA256f8ca763315a952fe7a406c899a3a2294c28dfff257a7cb94622dd220fd1d5cc3
SHA5123d08303b36a55dfd642fdab79b70efea0700fedd403056109ebf4a6ef2f87329558e3e1e217f9f5493cb8e43d66b3b1cd16916a494f143e0d07e40686660ae61
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58269b1abadb520bfeb192270ff6a1fa1
SHA1ca3c9f7f1fe29673ead8da25d53a95b6485fc410
SHA256fe0f0b6ab7d9383c573f2cf1849f9b7c2ca69884ace39068170dddf489aa460d
SHA5126da640c3a7316ef37969fd6483ba44ee92883907c19f5e7975cbd9186b978a831de3df928960f9a6726327417bc0c53c70f106857a17816c20d9e8664ff56c78