Analysis
-
max time kernel
263s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 18:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.peeringdb.com/
Resource
win10v2004-20231023-en
General
-
Target
https://www.peeringdb.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 4828 msedge.exe 4828 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 2112 4828 msedge.exe 33 PID 4828 wrote to memory of 2112 4828 msedge.exe 33 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 4232 4828 msedge.exe 86 PID 4828 wrote to memory of 2032 4828 msedge.exe 85 PID 4828 wrote to memory of 2032 4828 msedge.exe 85 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87 PID 4828 wrote to memory of 4332 4828 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.peeringdb.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9cbb46f8,0x7ffb9cbb4708,0x7ffb9cbb47182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4582489733139536868,1217529258792912833,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD55572c14acaa4bfaaa58c5e1fe58759fb
SHA1da4c7e8219e1d0561cf903d09f5306d921efed67
SHA256d438c130b38239387d01c392b31834a2e8bdd18bc05c10ea90072dfb26b92ae7
SHA5129ce7a6dc6f328c92c6cd7217b3269fb579b48c0820c2b993efddcad9a651913ed0ba6dd27d81f14972a2f7e7d57a4659097ef44e8bfb195c98de5e6c95a77ec9
-
Filesize
1KB
MD5b2b6fced2349ea485c6c34d1076e53d1
SHA129e11401582d3f13fc7afbc0080d37cb423fb8d2
SHA256fc0f18f590dc0804d8c23edf26ed73c8384705c4d89a0cc981f29e05535f5632
SHA5129f945a94b81401c14ab68f8ef64de3f029a89647023c3ebfbbc06dc5ebfb35429d46033c4491afb494d590cc25300ab99dc5d944b6a10a1b32d6757a9b177f7c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD53be343b5ae0a5070f149fcc6a4469f14
SHA14121f4362743548f0160265ddca5616df9c2774b
SHA25624ae748a4cf3c3f374db43499ee5fa858ad346ea547f942b91f71f0184468895
SHA5125d1f2ea8ce0d9452f766c6ae0267cffad81959d66870fdcc1b4985b9514c20acf5383711b150d705769c1110a445f02996125d2adf813924d996c8d173b375a9
-
Filesize
5KB
MD54613b60f5c05515961b340366735b8d5
SHA1fe28f8435ae453a6a692ab725d29540b0b461bb3
SHA2568e178471da99a9d0b1a8907392d82dca7962eefb5eee52edac6104c89ed88f08
SHA512747d7cf125e869f09c982ee853126ad8f8b3f9232e66fd109ddbbec32ab7bde1e5209ddc6db1ca033f463d4c795d4012f394f8f3f462432b8fa250de9b3fb960
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b4db1ac49b0ce8f1f8231d408413a978
SHA1999046554a3a30aa6eb99f57e7f267452d0b2946
SHA256d4fe87da2058af11a2a7b9ff29abd5d557247516654f826ab026cd1d77086cc9
SHA512a6fe4f72ea40740891f73d0c8baa0d60ae4a13de8aa03dae8fe4a2503bc373b8cbeb0f9e30cb4cef65cf65eb0b76d302143dfbca1f0ef6be77d2080a7c68f018