Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2023 18:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kiewitreports.com
Resource
win10v2004-20230703-en
General
-
Target
http://kiewitreports.com
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 5056 msedge.exe 5056 msedge.exe 2564 identity_helper.exe 2564 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5056 wrote to memory of 3244 5056 msedge.exe 41 PID 5056 wrote to memory of 3244 5056 msedge.exe 41 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 3916 5056 msedge.exe 85 PID 5056 wrote to memory of 2092 5056 msedge.exe 84 PID 5056 wrote to memory of 2092 5056 msedge.exe 84 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86 PID 5056 wrote to memory of 548 5056 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kiewitreports.com1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94ea546f8,0x7ff94ea54708,0x7ff94ea547182⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18260977991595810885,1516702733363100762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD54079a9637aeb670ef298f7555cadac36
SHA172eaf3f24e6f611a65ba8e53069d406c79bdf7f6
SHA2565d9d19db856faae38500e9c3ee04319faf7ef7b39d4e6bbb8abdc3d8b56f7261
SHA512bd918697ef3bdefa6a9d0f8f2057dab0168271ad003ad05c3bbbb2481b2922ef2743fc2f22b059866f310aee1b13682d3fd3e15a51a8e2c45fd1bb6f150b6a99
-
Filesize
6KB
MD58c53c697631caf57f282b6153dbe6cde
SHA1286dde37b0a28f38ecb65e26bcc5be70f1b6adec
SHA256f3f27b79156362a85990b86047465a520cfb591f9a4a68f2ade15788485e59c2
SHA512d2805f30fd5cbd439090c76bf83a66e29fe6f1488e4e428a138ab269879c544c1dfb85ec431a687d7d6d4347aa6117629ecafd85463c676baa11dbb0b6f97f11
-
Filesize
5KB
MD5d975269cbdc8cd7f11a69855ca1cfea2
SHA1e7ffdb2c3a62f37f998e425730e65a7a35f05c76
SHA2563b8586ed0be4decbbc26813040c0557881e283e9f2c00e94fd447212b4fb3a9a
SHA5122fedc04b67978ee31732757db5c6e116c7de636fea60e7395eb26241821ffad820647ab03742311b506c58c0064c42fe2abce8b95ddb6006c00fe3444607ac95
-
Filesize
6KB
MD54e6e294d2803707768b6aa9619073a67
SHA17a3a3ac9c5f7bbcf898d3cccffdb2e59b5b8a356
SHA256c534aae2a7098fbf3a01a4c97f2646172aec5805d6fe1f681912fbb97f4785ae
SHA5121ec1dcaa391b30f7f7ccbe20d6a966dc17fddd6b8d4aa5fe2411c04be37ff11ee2dd36da7fe371fa0d57aa70245ef769cb3cc54ce2886c890e12f4fbd1ac3332
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
703B
MD524e92ead01a793ca4311f801ffa9f411
SHA1cf00538bfaebdaf2d0e18bb37a19cf4bd42820b5
SHA256e6352b98e1dfe46ecb458f74d31220393f097ac7ad52fb71af1e56490e2360fc
SHA512a1c00bc2a0fa95be44e7411c6c621c76a1656066e5bf87775cdd492308fd7b5859cfacdd87944a8b7b325248029f54f4eb82598b36d1e49f71ecfadb1558b749
-
Filesize
1KB
MD54f1ab6360495ed5c8aee1c62c73d41e6
SHA179e1746f926a7c14846bc5bafbf156cc45801176
SHA256700968aaa1cbf1309eb3529896b5e9c0900c5fb0f0b9ad55b018ab67873cc32b
SHA512153a62d8658cb40232ad70983a9cf433dbb5e6581969922face4008fde91cea96c38c2eeac4f5196ae52d747714e3c3f8d2c9c3bab79daa998c0d5789c837a88
-
Filesize
538B
MD591f70d4ad00b11952cc59d5e70681515
SHA19d310bd77ffb52014f1df047213913c033b1b48e
SHA256e88905c9379e43fe78593b44510911c0c91f1e46c7cb4e81010f476b834638aa
SHA51205e2a38a29a429ef36ad0c2d0c5817e3f906d9743ad984eba38479dce312e5eb82d8388827c9e2cbf4796387b1bf03b773b8bf496af833b57a3517125ba0fa89
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD55becc92126a51c68a4357b9da7eee747
SHA15eb2f27b43d8e297f8cb3e6b730d2ac4f4aaa561
SHA256729b8c2bead6c4f1577483043d28cce6a4c8c2e44482eeeaffcd9a0fcf147c95
SHA51227524804b9c518c1bf6afc2dcd23ca7b3b5d5079ab4e0057ecccbeed4b66d2fb34e137374a0e94931e76807031d232c5ded7539dc4832f3f93a8bc5c76f77cd7
-
Filesize
12KB
MD57b6cbbd764a4335911789f46a7fff58d
SHA1bb9a19fe7d398b7f7984af0bb9c2b3a557659364
SHA2569e7b0f91fd888597591860f89e0075da1157729b9901239084aa582a243bfd06
SHA51293b2975d65b65f03fa64e3d7897e6042f56d0daaaf8e1b1011b2e2ac133b617abd9d6943bb661452f10589ea6e6cba36e643912ac176a743ae5b75c6b8dd5b92