Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 14:23
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wd0c435.agricamex.com/hZYnSUHP#YWRvbGdvZmZAY3JhaS5jb20=
Resource
win10v2004-20241007-en
General
-
Target
https://wd0c435.agricamex.com/hZYnSUHP#YWRvbGdvZmZAY3JhaS5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 4636 msedge.exe 4636 msedge.exe 1560 identity_helper.exe 1560 identity_helper.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2260 4636 msedge.exe 82 PID 4636 wrote to memory of 2260 4636 msedge.exe 82 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 4324 4636 msedge.exe 83 PID 4636 wrote to memory of 3964 4636 msedge.exe 84 PID 4636 wrote to memory of 3964 4636 msedge.exe 84 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85 PID 4636 wrote to memory of 3216 4636 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://wd0c435.agricamex.com/hZYnSUHP#YWRvbGdvZmZAY3JhaS5jb20=1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff27a446f8,0x7fff27a44708,0x7fff27a447182⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18051087303699384975,7995674004718557619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c175b4452642585502c6fead855272a8
SHA1699864d4fa86ca8d0ab0685394ee2659de959c7e
SHA256aae8c94c399a0c8d785608d875c6291888ebd6c2be3a81d281f5a4c73906b2bf
SHA5127076ab9904b9d77aa388c744f4243bdd9d694a3c316f892c5293fc8642ec7e9a2ed94d2a5127a1e5039444d0b361aade36685cd49acbed07b44b6c381e704094
-
Filesize
808B
MD511eff25caefd3b24bef99f9757f959a4
SHA1e088466c010e0e3b24f6a6bbc7e4e004f59a5045
SHA256081e37a1259b09378f5e4b6e3a27d3680e5747ac42560ec9c78147b1b1d7a9c8
SHA51242b5b7f8e7795a705472d1b35f4aa5d0e6a95748dacf828c123cff554d346fdd04d6a64b1e575dac4a88e318a37de77c9f0e94fc0af1e6f217f6045208a85fe7
-
Filesize
5KB
MD5d27235404020bc62f55e957b4fcdb147
SHA18a11f7409e0693ccd08957a31597c6e20eb88c01
SHA256f973871a5542fe4bdf95afcc8d0f41730d6408a503f756c81323dafc7090966f
SHA51263ccb35723d34a76378fd7084d6dcdfa806cfb20d1742d89b5e3c8bfe3ec37a2d1b161fa380248a679738d62da29a3907ae2683843ed30bca342cc8960cc9859
-
Filesize
6KB
MD5bfeb8b9216e5ca757add4f0abaac1a53
SHA1dc881f86a9ec3c2b66d68c2e34961c010b6ad0d5
SHA2568cd6210a1a8a5c8b79571219f715739d37ff42d4656c4ab294effbb80fb9721d
SHA512f09805500048ca8914f23cf318ca56cd157a845e126aca3aa4ef3e4afe858847156d26f1f0f5323a3a634e5f285007c2300f81f8f6f75582136fb2eeeb6ef47a
-
Filesize
6KB
MD59bbffe6843e23bcda2f89c46df4c393f
SHA19029b21f8b73088fff382eaaf192137b5b8a1fa8
SHA256f4409a0b156d7309e03951e0c8e9a12d79f257abfacab9f7e8683b820e35c3c9
SHA5122baebcfbf4db7e95c05bbdc986586c3bac6174c243de9e3990191d5f8a77d55fece63c2d6a0a2593577eb99cfa404efbbdff58770728539a25fbc7a130d61916
-
Filesize
369B
MD5e8643943c37f8649ac67df7919bc3db0
SHA1a64505951ebc626c9b256dd94fef10ccf37c74db
SHA256331a3790b59f4d9dea0e49c63b82dee2a335c4a7a8399670eb2d0e6c1906a0e7
SHA512df48848d3d0b05950ebfc718aa9b5b59a5daf068957353c1e706d6417ea5407484fc52eedd9e7b6b7591a535fd5e155d3cedce64bee8acda240076d6a7a11105
-
Filesize
371B
MD5a3efe3bed94095c46cf50ec82503f78b
SHA17e853c7a04db1d44eae56b13952d791813213e57
SHA256f05824bc81125ab62346335a124ff0acb3ca247337161382cb317e501c7b2457
SHA512a9118a38f2ead0ce3e380f521a9e3780e5e2fbfbfc58f3d567c6750f3c8949cd27ab629c85f14718c34d2bb79a638f15506890f0f2ec90340d5fe72c513188ce
-
Filesize
203B
MD5654cbf54d99cdff0c58e730d46918556
SHA1cc91c074dd524185958f818b124d708475f1355c
SHA25671c36a09b6515bd7b23072901282ad68bfb1726503fe31a27a7198983d155c37
SHA5127a5ea038dbf35c9a670a3f0e02faa83d849ba1082adc11a972fc748660f540786033ae10999a0f61acd32d7e36d120d7fe88755c789260f7e32cc9f9f7cb8637
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5571b82a2775ce53ea39e655fd375bc7f
SHA1fa2e73143b47d1a680b6024976d39cdecad466dd
SHA256d68e5b66dd56c26b1be13b9620a633d2aaec45d9fb5d662ff8ac5f850a09877d
SHA5120ebee42ba78ff4af4e21447effd3fb024f5b26c6b09106cc31b80b60801ebc72317dc7f72397a627e917b0c7600410e9f0558b0af64dabc7a06736b096dd7f41