Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 09:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://connect.sccm.org/HigherLogic/Common/ClickTrack.aspx?contactkey=228dd526-ca80-46a4-b55f-6366487718be&sponsorkey=56a5fc5d-b343-4db2-8073-f66b7c1fa455&src=email&targeturl=https%3a%2f%2fcongress2024.sccm.org%2f
Resource
win10v2004-20230915-en
General
-
Target
http://connect.sccm.org/HigherLogic/Common/ClickTrack.aspx?contactkey=228dd526-ca80-46a4-b55f-6366487718be&sponsorkey=56a5fc5d-b343-4db2-8073-f66b7c1fa455&src=email&targeturl=https%3a%2f%2fcongress2024.sccm.org%2f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2656 msedge.exe 2656 msedge.exe 396 identity_helper.exe 396 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3240 2656 msedge.exe 86 PID 2656 wrote to memory of 3240 2656 msedge.exe 86 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 1548 2656 msedge.exe 88 PID 2656 wrote to memory of 2664 2656 msedge.exe 87 PID 2656 wrote to memory of 2664 2656 msedge.exe 87 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89 PID 2656 wrote to memory of 2308 2656 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://connect.sccm.org/HigherLogic/Common/ClickTrack.aspx?contactkey=228dd526-ca80-46a4-b55f-6366487718be&sponsorkey=56a5fc5d-b343-4db2-8073-f66b7c1fa455&src=email&targeturl=https%3a%2f%2fcongress2024.sccm.org%2f1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa26b246f8,0x7ffa26b24708,0x7ffa26b247182⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4288 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17432082314962478643,15204699744105069719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD555d38a11a3a5c8e9f8afbd5cacb563bf
SHA110dcb5224660be22567c5881459bfd40e886e22c
SHA25637ac8ec582ec8088ae5a838eedce0b5c909407830a268a9cf25dff08224762c7
SHA512354d592aee84ea8b87506fa00f0cf7de19b87fb8666b61a54fab5a5ae7c7d85cd769ec2062bcfbb84b1a6bdac0bcc816fe2d8b0151dc5b5a3c1d0d4f4bd23ac4
-
Filesize
3KB
MD5796e117913aad5ecc964c3c900dc8a8c
SHA1ba6f86fbb5e48720d0311253c9f74e3fda8ec6b4
SHA2563dc8ec0d008199c5b37abfc66e84fc5c2666969f2b2ae4098abf7681c479aaaf
SHA5122baf8dae02a9a61b6de6ac162a31ba1c0f6de63ee6f86c1141750d53edbec9abbb1a62858af9e7d233d52650caca0dbe957e6d847bae4cff784dafd92879b037
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD504960bc6fc11537314d6110027c7fdc9
SHA14d55ed3684ad4819513a33c8e6ea66a5113effe6
SHA256294eb80bed814cd454ceb5dd0da8d5dd68dc2b29f6e1aa5356c1c30eee6296f6
SHA512f2aa69abebe431fa70d996fe29fde4cfd718097492e0bfbc69b06b698bf166d66dfbf07401c805179375b075c9e6de66699ef44c3137e9ceaa900d61a9f85164
-
Filesize
7KB
MD5cf0d5a61bb087e772873ff6e1caadf31
SHA1bf22b78d5e8f685f2ee06a8073a0fef743513c45
SHA256c8527dec92a127d5b5f29d9b7411a01ac6bd179f16716e54c49b36853990d8e1
SHA512028fa7346cf657b22579e3818f7df362978e7506c8e8c78619aea35a0a5da5bff2d9b63a74807d62a68a87c32f1316d5878440b29f5af2bec2ae460df94693ac
-
Filesize
5KB
MD5c8b9d93bca13ded53bc45c5abf5f943b
SHA155303d30ad510f287e08306bd31739feba34a98d
SHA2565da510c221b416171157dce661b3d7cd65ffb3e7cd5777d8ad2bd14d53a9f8a8
SHA512ab43b5b0e0612079770c2baa394b68c9f45a70d85e7bf0486968041240101eaab1f2dbc1bbea371a82fdade00fe0d1d29fb20cbdb56145d63006baf378e4b7e7
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
1KB
MD5cdcda7ded512fc122ec3f582bfd54f20
SHA1acd2caca5d9a6b5e3a99c7ba61051b8232bbe1d9
SHA256365037369d5138914c88cfd4079a6fad6e863040714c0084fe795fe4d1212ded
SHA512692a46ee3628b799ddc6a725929a71e25d18ce405452d791b41ce7d7aec66e89aff555157b1214de1df7abb594502d492ba77ec80870c4f1b755722c58c9368c
-
Filesize
1KB
MD58133d58ba817d4e4c55037c38c688ec1
SHA12bfc47412424530cfbdd7098c32bfb985c1592f3
SHA25691d7d2fdd0b6afec592e76c111634d5f2ec583d12ca116e6f3043ebe96a6fce7
SHA5126f4bc20985e989960942b6ba4d64a2045a02a25e931340732ce8ba9c50a5ce2b2c66dd17bab86724f6d0e28a23b578b4a33df84f34541f6b4c98ae06dd9d8448
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD514dd9ce4b5ebbb8ab9737c7c4a78be7a
SHA1cf50d7a3e771694c1e803e4a5f593ab12a2f418d
SHA256440d021c54d1dd487ccb3c5ad634eb25b267d086b7b58d3aeab54b320b4f3ed7
SHA512c0d65057a2701f805212cad104a67fd208b02657b998daf0e366b6bf0ebfe64fd61b59299c22ee35e79408d469c05453ced02291e4554b43ca6d1e5dbd0db763