Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2023 14:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cogentcomm.biz
Resource
win10v2004-20231023-en
General
-
Target
http://cogentcomm.biz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 4740 msedge.exe 4740 msedge.exe 1688 identity_helper.exe 1688 identity_helper.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4484 4740 msedge.exe 84 PID 4740 wrote to memory of 4484 4740 msedge.exe 84 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 4676 4740 msedge.exe 85 PID 4740 wrote to memory of 2152 4740 msedge.exe 86 PID 4740 wrote to memory of 2152 4740 msedge.exe 86 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87 PID 4740 wrote to memory of 2136 4740 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cogentcomm.biz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9cbb46f8,0x7ffb9cbb4708,0x7ffb9cbb47182⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,6302169501155156132,15084722763694083215,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD52e1095e913a3b2ef50556ef830694d8e
SHA199519d35278d952b72bb35430c4632f0464a6c26
SHA256c7f538a0fd5f509cfe401615fa977e8c71f582dc9448308be304332288387a1e
SHA512110c3246b17852984cb84d83bd45cbe4650b3aaf26eb921d4ba51e87c16308b255fff476fe3dfcb1e88e482b71f87c74c383f764699315b7a92928fb1b659174
-
Filesize
5KB
MD54321f1862a87c0839a41a883e9daf4e8
SHA19539839bc0433b9a9cfb0c531ed25fb14e7a5c9e
SHA2562ca2147408f57340df66af5d1410c60e2762ad37ef16f797fe6b0c59501fda4d
SHA51287c5c1e9f103f52ce46d07adad203266776484f34d249632a8dc7f3fd460aab29be29c032c60b3000de2973e222d586a61cac9e8e09efa9942bf81c0553b8f15
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a27859163fe4de041084ce1f184f7478
SHA1c03ef07d8ec25178f84fe0226dc6309a5f78a4f9
SHA256c0b4a77d1ed126418d124eb4730578377d4bac3d42ebb23c7cd2f7368c6578cd
SHA512903f528670d165c9064a4bf7f36df67359fa747af0ce9c2155be2332968318ed88bd62f46d0a85b3a9a7802ca5c5dffedd2695a28a9b343247d6726bf213f9ea