Analysis
-
max time kernel
82s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 17:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://inlovingmemoriesnews.com/steve-wylie-kamloops-obituary-district-distribution-manager-at-bc-hydro/
Resource
win10v2004-20231023-en
General
-
Target
https://inlovingmemoriesnews.com/steve-wylie-kamloops-obituary-district-distribution-manager-at-bc-hydro/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3200 msedge.exe 3200 msedge.exe 4736 identity_helper.exe 4736 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3200 wrote to memory of 1060 3200 msedge.exe 83 PID 3200 wrote to memory of 1060 3200 msedge.exe 83 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 4760 3200 msedge.exe 85 PID 3200 wrote to memory of 3160 3200 msedge.exe 84 PID 3200 wrote to memory of 3160 3200 msedge.exe 84 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86 PID 3200 wrote to memory of 1952 3200 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://inlovingmemoriesnews.com/steve-wylie-kamloops-obituary-district-distribution-manager-at-bc-hydro/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb209d46f8,0x7ffb209d4708,0x7ffb209d47182⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8697975170591570071,1043562663431332303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:3060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD52c946ca80142d88fa75de6096c69fcdf
SHA1b0d442490bfb13dae6b212c9d222e6d3de7a1c5d
SHA256279f83680a98bffee5b35a5e67a95fde8765b824f5260fc07c7b447d5730ffbc
SHA512f8b6a338d311cd84b1729afea19cda86e53a1a575370543ad4d30bd035eb4c7543a84d8692b793e4af68a47a0f1f98b34ec0a57ab57e2e7ba05810c609e100f4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
914B
MD5898c31970d5632f62ea6db24a9c1bf57
SHA16765a8b8dc031cee58e9845e7d1364118e14dcb6
SHA256f5f6c8553de7f66a8c4d7bbf6fbf832fed25d1502638a3c9585b37dd8df931fe
SHA5127e93e062a2a604fd3279afd5dd611a358b82d1774f07f30785da5faf4aafb840cfec9ce133aaa19edfc2a2ba6be93197f140906e6bff8d2eb1052e6eb7b18d3c
-
Filesize
5KB
MD5aafaaf77dfc346a6f3fe96e1d673767a
SHA167c57b46a4d201f51cc1962c1ebe0a5f69ac72b5
SHA2568d87189ee1c95d1cbb43efe13366d181b516647e1ebf5dbbfe53dca9db5ee7e2
SHA51251238833b803a12a4f9e9c984a5a25238db8103de31db6b8dd16cd97990eb3c83ecf8ce98cf9f63cc9403f46aba0c41f0849bcb5459eb5c1a258231dd3518150
-
Filesize
6KB
MD5f51cd1370578a668d9cafd708bf06cd1
SHA1f0f7d1fc945a869e2d29f9e670259befcaea1cba
SHA256b005421560f2468d206a8a6609ed5f73a45d7bcd23acc621e83d45781244b02a
SHA5127522da47623f425211ee3983515343deaaf80d2eb490c0225c655c4119809b2e76164f286e9db8ee62083df1cc7678d7bd7d78ab8676b01b2f13750aac7867ce
-
Filesize
6KB
MD5bfffce5544f014b1c0f45689facb5579
SHA18751f4da79bd39752b1682b59f61bd0b3bc3139e
SHA2562c4ac03265238cfb46f330b532a6302790e7798db1bf2b37ab0c912e7d298c40
SHA512ca87cda74c0c7439fdc94febc72c4c32d1175297f77ba42b310db07d770168e8fb19299f365167170b50643156e90d1d1015a1ae2c2b669dd5307af3e232f516
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50b328df124569b9d8f199c04c55b6e5b
SHA1d7c223bb73882d77dac0bc0ac2b63f888919a9ce
SHA2560b369f29c508399649507ce7360a60edd49cfe7ba6082491bb4de743c8966a01
SHA512b849caf4f05bd7fb9f083fe0363a84ef3e1795393ea5784203d5f39c199e1ad18104566de783cca7dcbeef7c3e5a5efd96e4e0081b130c62333e3542f910c78c