Analysis
-
max time kernel
77s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 07:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.tokvila.lt/file/43582_Toyota_PROACE_Verso_Kainorastis_2023.pdf
Resource
win10v2004-20231020-en
General
-
Target
https://www.tokvila.lt/file/43582_Toyota_PROACE_Verso_Kainorastis_2023.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 656 msedge.exe 656 msedge.exe 3332 identity_helper.exe 3332 identity_helper.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 656 wrote to memory of 3016 656 msedge.exe 54 PID 656 wrote to memory of 3016 656 msedge.exe 54 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4628 656 msedge.exe 88 PID 656 wrote to memory of 4632 656 msedge.exe 87 PID 656 wrote to memory of 4632 656 msedge.exe 87 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89 PID 656 wrote to memory of 980 656 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.tokvila.lt/file/43582_Toyota_PROACE_Verso_Kainorastis_2023.pdf1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9d5f46f8,0x7ffe9d5f4708,0x7ffe9d5f47182⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3388 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6752 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2112,3518515468426567984,14536103857260131909,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=6720 /prefetch:62⤵PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5483924abaaa7ce1345acd8547cfe77f4
SHA14190d880b95d9506385087d6c2f5434f0e9f63e8
SHA2569a111c2b76c1b5f6d4f702502b9ff4326b7b5682921c2760286dd073824cb684
SHA512e4ac0a0d5f06e056901c68488e34358a32a5bc7aeffcd82af7eba6043d0fa35eaa67a67c3716dcb661aaca441677819bcba7d35bc4efc6103f3ce32f78e32310
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5138a749a5260c26228a24497966254fc
SHA1a46a092f5b84db63165a0ef7a18047d6cc1e144b
SHA2567d7dda4630c98dfacd2e1b20765cf49fb6f5083485d9934a6c2b369412f19594
SHA5126db40da7c903cc974b8b2947d31a88fa6d919b14856a7de5df3121bba3770dca7f3bc713b51acd0500c8a88ad0553a42974591b4542cc847bef5a8bfef2ce04e
-
Filesize
5KB
MD5cd4cbc9cebd052b81c79e9f50abb318b
SHA161ac9113cb8e1f227d4984b40cc163f0c6a9043a
SHA256b85ea65a753e15944e28951f2228565dbaf784ff4251e303a72ff9b6fbce5d36
SHA512dc4748bc86cdcdc803925133b7c9560d35788b2c480c77e655361f64357f0e90605a35c35b3006f0705e3d89af1d9c2518a1bb760cc54eaf80c9ebe64d22bedc
-
Filesize
5KB
MD56fedd18cc86e0f2f4109bd08cbb09b74
SHA171771af2c499d6c57bc897160dd21933d4fc821d
SHA256d2febdede18b928406b685d12ce501bd8ef501b11389e939ff423265d99aa22b
SHA512c0f489c69d966d797bbc931c722805375476cfd319a82145658f489c8e9e13790263694b897eec942e771dbec44db602ee5a7520203f98b4244e13cf8c582611
-
Filesize
6KB
MD5f6dd19f85623fbb9a1653ba26ebe0fb5
SHA1385b8d9ea49635a445548b46a572bc5e4b2ca6fe
SHA256024ebc3b489f5bfb5dc08448c543296a58a2e3c95cf21a7c350ef32af1298eba
SHA5126eebe25c71c412cf7ca0b5209dac9cb5d228962f0b6fe66507a2a15d047d199969c3315b785327b4cb6ea0855d0d4f01f19e478697d8595ce759c13f2f77eae4
-
Filesize
24KB
MD51c706d53e85fb5321a8396d197051531
SHA10d92aa8524fb1d47e7ee5d614e58a398c06141a4
SHA25680c44553381f37e930f1c82a1dc2e77acd7b955ec0dc99d090d5bd6b32c3c932
SHA512d43867392c553d4afffa45a1b87a74e819964011fb1226ee54e23a98fc63ca80e266730cec6796a2afa435b1ea28aed72c55eae1ae5d31ec778f53be3e2162fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5801ebc1a5924f6bdc511ae4a670cf9d5
SHA190d4d8217cd286f1fc5c9e2f158cd785d2a81bb8
SHA25611f0bdb7b08893e7000285b6988aa670e76b0c366de1d9b23ef13d5857ffe36a
SHA512652fc3082e0151308490b1d33c4d16f1f430ab5c64ab7c88b50257b9fcb20d67e4b6c15d5c0a5abee95600d557bc42e6db92184ae15f21c7eee41d863fa543fd
-
Filesize
10KB
MD5e550632b268e0aa1215d5d9675dc2522
SHA175dc7fe247f2161a80563dae99b453ed29eb805b
SHA256aa079b229d2a4481401e448ad8d87a62fd4c4331b113b0316c5b63791e098d70
SHA512fb9f9e6cd98f8fe7550fbff5cd0b9a5d4dd5df4d235233345c25c42ae5a1087c90912218c4685b06b83b707bf77e199f709e808f9fea0718fd7308f2ec77b344
-
Filesize
1.8MB
MD51cb57ee75be4175b189cc61e747031a0
SHA1f13e84cd97b7dcae22ec54d2177fac62affb6e3b
SHA256e2111f1a3867d1e11a180976fdaa1135f4a2f98a395e2727726e8fa0f246371b
SHA51230fdd0730f99aa22bfc7218d2d1e2c4f2e4cf88d6169a9ac9a0912f68893b81dcab262355dbccd200e952d016688b263b085d3440952f535d861d6dc5195c054