Analysis
-
max time kernel
85s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 16:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ranprojectss0wemaninit.blr1.digitaloceanspaces.com/webmail.html
Resource
win10v2004-20241007-en
General
-
Target
https://ranprojectss0wemaninit.blr1.digitaloceanspaces.com/webmail.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 2468 msedge.exe 2468 msedge.exe 2780 identity_helper.exe 2780 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 4496 2468 msedge.exe 82 PID 2468 wrote to memory of 4496 2468 msedge.exe 82 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 1256 2468 msedge.exe 83 PID 2468 wrote to memory of 4852 2468 msedge.exe 84 PID 2468 wrote to memory of 4852 2468 msedge.exe 84 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85 PID 2468 wrote to memory of 4968 2468 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://ranprojectss0wemaninit.blr1.digitaloceanspaces.com/webmail.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e4f646f8,0x7ff9e4f64708,0x7ff9e4f647182⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,11546484985721810600,7738669429039143558,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2072 /prefetch:82⤵PID:2316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5ff06df0de0d37a391cc3bb4525d7f0f3
SHA117106acfb9ecea7cdde08171d8c8659f4889223e
SHA25603606c2644482ce8232aa960a2adf42eaa48a71b08512e3a8af2f3a97127fe5b
SHA5122fd1b4541e584c34248bb7bf9dad08132e0f5fdf84a96b111dc56a5a68e5df51d3e307305604d9f7d428f0795f7496a3fbd48e7bf9e4f086894f68f80be8e588
-
Filesize
574B
MD5cbb45dda98769b1add49827b6a4ef256
SHA15679ab0ac75044de5a51c44b242bb1565eab5254
SHA25665491e409e1718ab5e8d8d7c2458434aa8b764e76a6f29b9f860f85cde39ab12
SHA512775ffe5a304116dea8fbdf1d5c5d4ec3315644e66da719a176bc072237fb815deb28075d8efafcd12d2611f827b3db9be3df4295416124ecce8d54b4abf2e64e
-
Filesize
5KB
MD501a3e4d34097f3869b933c05338ef0d6
SHA11d31a20d6234bd00e4c61f5fe15405a4afcc294e
SHA256d6144a56d4d614956a66b3e48aabbf1e9903e245bc39bb1924e9318342b5e61d
SHA512e8aee66aae80a4acce8e9694ba4ce0fb74aaeddb2082c7d125eb452bd74e152fec987b07a9502239d34ac5130a877fb75c267da72ba9c13283edb67a6c04e54c
-
Filesize
6KB
MD55d5e66e3250b1f15e84b8d6f71043898
SHA14a594f8edcad387de98352ba8611c51fa8b03415
SHA2567bf939dfd835c6ba93cccd1f982a6a1c608806ae363c4f864e0dc6c9a78add24
SHA512da6785c59b255a4cf82bcdefd2c29c0d42b969fb50fced0529c279f4489c632c43cf28e10b3080393bc7de28b19bec0e7a96b82612827fdb88f9cab1e8e9481d
-
Filesize
6KB
MD5a74d8eaf2c8413bedc2a22031dc34dc0
SHA1a3ce5e78a2f4635beb53ca45a50bc8aa89bec8a6
SHA256167d0a523eeec1fd059d5e70ae4db61970ed22760c2677e372a516df40a83327
SHA512711995dcd4320224e5ea99ea2ffdaeb59ddf28a2cf9314b2a98c97f063af317618aa580819e1b3457b160146a4786301ceb63b7b3ab307722b46ec3095e0d056
-
Filesize
537B
MD58462ef1c1dd2953418333ef8413af67e
SHA1b0b09664334fb56a92c9516300f92e62c84bcca7
SHA2569fca780ebb262bcbf1d39506663608f7264a64dcedc87e61aa090467cfcdef1d
SHA51240bbc5862bb7bca0d47967912587fc7971d6fa9b56615fae445a3972406110aca6e1262103d155dff2db9a69e578714077969186acb9bf3ef8f265ce22c64e77
-
Filesize
537B
MD50c7d337067a33580bde16b40b8f6394b
SHA160764ae64eb95805428b6fceb38538e99b8eb802
SHA25618a913e8c45e1d008ec592fd569092491a4d7663223cd35f7977233f228f3071
SHA5120397e8a64095094043ea662d8c409fe490d36a2ca29182944181a2bad9f46a9db0d1caecc9a82ceeeb60314d2d287324a314af937818e236f5f670694462171f
-
Filesize
537B
MD50f6e69f4c380bc05d6432ec1f12bb4d6
SHA1bed791b413890a6a15e4d15d5fdbc2da502cc941
SHA25638ea8a4943cc727b58328342f618c3bada4c8b4f589fce9cb731c3888e1ecae6
SHA512625c4f1cab383dd43360a0b3fb85c61b6327b824a98f1ab82904340eed490e67f01b224a07c9671d5f9ce63b43e0177c5cae05ef27ac2d1e63a78b34444872ca
-
Filesize
370B
MD59c4e76106f45c8b8d5a47c0659a441a7
SHA1767a0314f755e0fc056db79866dfcb83887b2577
SHA25676ad3a3761b9fcc1a8af3ed3f9b551db414e62e262e1ec506a44b3c71cbc3488
SHA512c59919b6b6e01a8ca4a51b1aec7f12f9065496ce7869073db166d04653f390d4410f27a8a88b3fb9cac4eef371b7f18fc647f92462e216796db204f534ba03e8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57101511aa1c4ff84fa64fac069b2ee62
SHA1f95151d6b629e65b15c4c85c111d89fc5b0b0f31
SHA256083edad574563d577660d120d827c34e5b67d6cdad224cdff450fd834c61f3e8
SHA5125e84816f53ca4885b10fd547b64b161e48b15526c2c33e17ba9583ff6ff78ca5c9eb3b89dfc7ec7140de62d4ca89bd51c823bef48b3b28f5035b5da03537d715
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84