Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 02:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://monitoring.onboard-test.com/
Resource
win10v2004-20230831-en
General
-
Target
https://monitoring.onboard-test.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 2224 msedge.exe 2224 msedge.exe 3800 identity_helper.exe 3800 identity_helper.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1428 2224 msedge.exe 23 PID 2224 wrote to memory of 1428 2224 msedge.exe 23 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 1752 2224 msedge.exe 81 PID 2224 wrote to memory of 4268 2224 msedge.exe 82 PID 2224 wrote to memory of 4268 2224 msedge.exe 82 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83 PID 2224 wrote to memory of 2888 2224 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://monitoring.onboard-test.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb07d046f8,0x7ffb07d04708,0x7ffb07d047182⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5223070325585799498,14309459221938149191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d8294073f3582e3c0a607a60b6d6ca48
SHA13ee881f415563afd0c8265f37eb78235aae909bd
SHA25631900aacca28ff914c07a077cb9a39ec437ee059958564d718d04ae47426e286
SHA5128c256228dadfa577cdf938d25ac082a232f1e756cedd587f8e1855c0ff7c09571ebffc8221016ccfdfe0b17d356239685eadd72eaa7c32fe46fcfcdf4aa6cb07
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5f7d9a39eca6e44db8f220a88a2911352
SHA1cc4528076988b4424593d6681897e5f8aaa5f2c7
SHA25663a7501ddadcc117d74576d109c6210324cca142789b9194cad181a6bd4c079b
SHA512fed8cc19aaa6f6bb6aa5103a2fb3c73e71c6cc826a8f080fe57d7b5e5a2b1b9a0abe323435e0fbb34267cb2dc661d6b40315276786b6630384e0fd6180b39ae7
-
Filesize
195B
MD5520b983122399918d4b35f956911158b
SHA1ae9ef5d3893e392e54978c0303ee0b70e12e05f0
SHA256afeaf3b3b2bb6e90b4c52b20bfaed2f07c2ca71f8600ddd10e65fe25de145d88
SHA5128033a192b1edc4726a51b89620683ca63809cec1a3340ae0c64eebc7940086f9c5ac8293fd47efdbea5b67421d0b2c025003e116e0a448a65a66201467201618
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD599e3f14465b084ca682a5cc5a2eaa23a
SHA125e2bd498eb75a2d7ea5a2da5cc27a44c6e8a52e
SHA256d796394191e7181ad6983b66a89e39b10a6a86877acb5736dd0aa3e68928a0a1
SHA51275b64ea2801040eacf56aea30bf9fa6297fa8fe30803caa95f675b219328f8673e50593eeb9f83020032d87069db85f12af3f7b3399a1f8fc112c19276fc734d
-
Filesize
5KB
MD5233777779bd31f36121e25ea3da2db08
SHA127d87bbaa88385feb17f5bfb799db7bb16b0d568
SHA25678017eb699b2ba39adae22ee0f25e60cda0b67b0080f781eb470276bbb794b27
SHA512e7e8e30dd5e434058e06d1a2330f9fd771d9485ec50627d8a498947e8adda0c090dcdf1e7db44ef47d0a7edcd64903aea87e385d19f4fe0a4aebf4f08660d54d
-
Filesize
24KB
MD55911f98dae6d97c4bf9724fa3ad0898e
SHA1b050119cb81c1d6278bf35e9e2950a3dd18ba7aa
SHA256c98200c0450dfff44b0d847df78630895b4436320739f9ef01b3a3fe6e9fc198
SHA51260960c1394c1a28f52d4087299fc663b741a139a0a4182e5ca805322de662d89171787793b0fe906aae913d7457ccdb6559eda8ad9c6126a704985b63240e1e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c0c6fecad18ef2363ec3e28e468bd862
SHA130c1078885d0e660274436d0831a021f26f7516b
SHA256379a96e926a9f1ad972906f6d5e431780399f2003167fc3e4786099f580f4a20
SHA51228c5b4c1fd0f4bd1abc31f969a912814645b3b111249debf5d22982cb01356910e0f2f8f69df73a1b6830f02bc5f238525102d913cc755f7155633bfbba28f98