Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 14:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://hubspot.contentools.com/api/v1/media/330518/download/
Resource
win10v2004-20230703-en
General
-
Target
http://hubspot.contentools.com/api/v1/media/330518/download/
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 1308 msedge.exe 1308 msedge.exe 1864 identity_helper.exe 1864 identity_helper.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4156 wrote to memory of 4632 4156 msedge.exe 83 PID 4156 wrote to memory of 4632 4156 msedge.exe 83 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 4984 4156 msedge.exe 84 PID 4156 wrote to memory of 1308 4156 msedge.exe 85 PID 4156 wrote to memory of 1308 4156 msedge.exe 85 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86 PID 4156 wrote to memory of 2780 4156 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://hubspot.contentools.com/api/v1/media/330518/download/1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb505346f8,0x7ffb50534708,0x7ffb505347182⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,14551079413594521900,3400837598856949086,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4124
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
191B
MD533e0b142badfc4f67bdff350d46a3220
SHA15097290fb09484c41a0545d9776e5f40fd97bde7
SHA256882f88efeaab56d502d84d280d2edcea04c011110c591174f9d539b4edeb84ca
SHA51201b67c27956ecfa651a8b26b99d305aafb3725e15498e6e25b786e8f68bc8fa64cfb872b15842faef7e935e4875a493ecbc00b8b577c72c73a90d1336a6c7aab
-
Filesize
5KB
MD5e5fdb87a4f8b7edcb074eee452ca4cb7
SHA1bf0d7c53f60271d2af9d89924c17195619e5dd18
SHA256021947118c9fd0ed10d68bb14c62952cb6ef6168ad04ae7db31c5a8a29a501b4
SHA512202c47b5aee67ad1ad4888efe32e93aa8a627459a98fe8cc931b883a1034ecde0257c25c6036c99072ce69c828f9555ce71a6b3bcb9c3215054f1adee87e21f6
-
Filesize
5KB
MD54a05d79a9340e8b32927c17c127c42ea
SHA1e8ab57cc1f2af6a8548fe767826ce5e802ca8cd3
SHA25670e9fd8cec9620fa91b8518fee9feadf55ef7709c15a9d5928261e8174ccea90
SHA51243c7001af20c3e33e3b25e4b62495dcc57478028fd7d9042116087f77b1eff22dd1b4ead9a04e753638c29b2c792767b7fe9952176fe75ae4b5bc65733d0c0c5
-
Filesize
5KB
MD5b9727f107e13012173a0d3b295bcc3c2
SHA18443a0a658dd7ded6545352a58c7bfc3ee8d6794
SHA2562978dc017671f9a01a10015c12eeceef8a343eecfa4c08f25a53b24e45943ca4
SHA5126ec0e8d68b460e22debd19234b2dcadbf1c514b469678e49be6cc62f1a81c491053b32fcdb491504194b008e9b38f7336586ec4d8d5e8c9df9d0f1387277f273
-
Filesize
5KB
MD5e176cc7c70acd8d03f589b6c1d464152
SHA17afe1230d252b2ce727976b43b27903dd8b9869e
SHA256eadfe376e1b3059891979cc7dff620ba9398fab02c3141cf1fbe92cc727836c1
SHA5122b46af004aadb4c9feec187dc19d0c487b8ab239d942dfed1c6a01427f2e3d9f498a5fd70cabb8baeede25a0d10da630990a99af5494ec27e2c04611e3751c6d
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5974c2436e3c6c8b9324cb32bbc110b5d
SHA145131ae9b011e7cfb4f90a6f5dac25161918f882
SHA25625b43dd20386e30e0219b644b6cf525bbedaf5758b9a6b54f24772dc292607a9
SHA512ee79cca36f7fdd90e98307050d1e1d71d72cb7e71799f9e27999e5da358b2d049f4349ecb7f6611bd4de9c3d011b2a768d323267cd50fc656bc3863176fb7b62