Analysis
-
max time kernel
92s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2023, 07:52
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://engage.leena.ai/[email protected]
Resource
win10v2004-20230831-en
General
-
Target
https://engage.leena.ai/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 1792 msedge.exe 1792 msedge.exe 2648 identity_helper.exe 2648 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 3732 1792 msedge.exe 82 PID 1792 wrote to memory of 3732 1792 msedge.exe 82 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4220 1792 msedge.exe 83 PID 1792 wrote to memory of 4672 1792 msedge.exe 84 PID 1792 wrote to memory of 4672 1792 msedge.exe 84 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85 PID 1792 wrote to memory of 3952 1792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://engage.leena.ai/[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae3bd46f8,0x7ffae3bd4708,0x7ffae3bd47182⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,14157111436921982491,8321693037420141312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f7e75a88fe92d5147528c475c6908243
SHA17831682352cfdb17da7174cea8674e61e6fe7ff6
SHA2564faebaa12ccf24466cb17632b61174043ca23e183a44b29e9e3f6cfc2ce3192d
SHA512f210c56502e232b9e9b47c13eeb941a2ae7ee5b7b27742902172935e8986b23292151f21dd2d930d384b4dc74af032297b36947d1f8251ce5208cbdf93a56ff6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\31b81666-d60d-4a63-bc47-544748b19151.tmp
Filesize6KB
MD557bf345db234b38783baf4d82055c049
SHA18b1b3dcfe53fb428fbc314f0aee033ce427fcc98
SHA256c040d6c404c47ab379865fa7f5bee2af3ccd0ae53538f739ae02ae3d6771f720
SHA5121d0f6bffc471309b8659f716417b1cc309e9eb855255c3fb1b7d91dde9e3567ed1cd92dad26078bfca59f1f42430a8c0a332a08bccbce840aa28ee1d39c76ce4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD52a1c55326925f32dbc9ce7c9f098ed43
SHA1c00e9bd9950f3e220788e12a22e03021603dede7
SHA256d31aab85d2ce71d901ee8e578c3d70d18f4aa80ed4eb84a698f959b19e44f8fd
SHA5127b36215bfb9683f1d8ed5f59bc4488036f56f0f80a3f3a29dc37a809540cf099d0afc96c2b392a91d179fd050720a765e965b10491730431aee40b4cfa1ddb57
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD57452e13881636a5b58f915ba90e13d86
SHA19124526114a065e59afefeeb3cd0531f32452256
SHA256415426c74a33d7c7a6a8ceaaec9dd9c0269b2ae8c8d55561a63c73caed4624bf
SHA512bd66fa53992c4529318ec48ea223d7309bca1d46349909acde8260a907ab852c0725cbd20ea35b5820edbc6d43e99332d7165095c665901503193bfd176fc25f
-
Filesize
5KB
MD518aad8fb3d623237dfb80a46f89afde6
SHA1219e60f22b54fc48b9695de355687c74577bfdb0
SHA25657c6285c7e7fa5e97bcb37c986ea6e0c6d0a023d1fbf7013dcf5bc1d65aa8cd8
SHA512c965820d2fd6ae008f6f74b1f6200ff8522dac0e5dac14c5a15682e401650375db6e15eeff058f706a23b7fa720f5dc46ae05a00363be3a8a04f288d34d36a72
-
Filesize
6KB
MD531b0660af962f538aa779fc4f62a47fc
SHA13cd2e90222db97814d0295fed0f314f56020ceb9
SHA256635b962ab649491a6673de15016eaff07d746635716f528c1d6b6e71588c30c2
SHA512469ec96f1972250527222ba19c0526a810098b3e7dd67fceba5c59bd235063a42fc52439722e70d63a00c5a5e9c3ebb27d913d085c8af3a403532a3a8221f365
-
Filesize
24KB
MD588d76733cde18621ed7567c0cfda2ab7
SHA141859bb156cfd94dbd7bd185567df2a9a5479998
SHA25617a4767dee231bad758aa0b51bd7b7d8e6201c936e5b58aa76bbe5275c0c89cb
SHA512e6555a48831412daf4af0a0039b47611428984d22ab0f851c62e68dfc9f91546542d0d68c759a988cc997b0fb1998e7aec10fa918869ed15742bfc4899f72f0c
-
Filesize
1KB
MD5d90794cbf4d3b5d258431c524af1b0f5
SHA1aae0ef914cac768403fad5ae52e299468e46562d
SHA2567a973a7ef81abcb55aaa9acccd63eca1187a374e7f12743c547b09ae654af8a3
SHA512b846e36f169b9d5ac4d076c04013d5dc1f16557524a35237879139ac339c7196b228757b2ed28e4b69fa350deefa438253460286c96afa5f2fdc19dba6cd0e93
-
Filesize
1KB
MD52a77881c157b586a429d0335cf723949
SHA1bdc1cbb2409da9293ed6274c4f90774270fef7fe
SHA2568c4813272dccd6acb1ec21ee079faf0d36b3a83ec3419be94c25fda5553d11e7
SHA512ffe17cd37917979494bff9e986c20eab0c1bb69ebbf47a782078cc8795603d7c6d3f60c82fd38e4bc06205aadb36c18b7b0c906ee2dbbeea8b024f944fa1ddd6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5af11a8c66ab6e2a22a38d47f3b8ae531
SHA128f0109ca2c24f6be7e42d5b7873f3a12764dce5
SHA256d46c19598ad43b197d47c00ba54732a247848d0ae5c44c3bdd7a91c553133fc8
SHA5121b1471c70ea0a11f5ee694f790ecb4eaee4fb711c635373d61c5cafb2f584bc0f7ee6610e05e6b230e15b1962bc2d7ece4f831198ab58077885116ed77109468
-
Filesize
11KB
MD5fc54fe87acf59543caf48e609b7ba3e3
SHA1ef62633741599a893f9f8f2627189da8d4985efd
SHA256379f95f6add52e710125f3722a5eee3cd24ee8ce0862c547475863d191f35aa0
SHA512e2327bc848bc64cc9658bf22f9a68888dd48b117a410eb61cec098168289952803f999b8a8823f8e43811eac763d664d4280804fc22529969ad6a3de125b23e0