Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 07:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cdn.mcauto-images-production.sendgrid.net/00bd680edee2a32e/a7d3e370-5c19-4ae5-ae4a-68a51bf6c53d/801x206.png
Resource
win10v2004-20231023-en
General
-
Target
http://cdn.mcauto-images-production.sendgrid.net/00bd680edee2a32e/a7d3e370-5c19-4ae5-ae4a-68a51bf6c53d/801x206.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1920 msedge.exe 1920 msedge.exe 3752 identity_helper.exe 3752 identity_helper.exe 1632 msedge.exe 1632 msedge.exe 5744 msedge.exe 5744 msedge.exe 5744 msedge.exe 5744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1920 wrote to memory of 4288 1920 msedge.exe 88 PID 1920 wrote to memory of 4288 1920 msedge.exe 88 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 4916 1920 msedge.exe 90 PID 1920 wrote to memory of 1580 1920 msedge.exe 91 PID 1920 wrote to memory of 1580 1920 msedge.exe 91 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92 PID 1920 wrote to memory of 636 1920 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cdn.mcauto-images-production.sendgrid.net/00bd680edee2a32e/a7d3e370-5c19-4ae5-ae4a-68a51bf6c53d/801x206.png1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae41346f8,0x7ffae4134708,0x7ffae41347182⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6754793901742843968,13946250355902360542,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD59d715c864776b6a0aa848b3fb6fe650a
SHA1e7e47cf4221b12d296e102b391ee08c53b8a1b71
SHA25651dd71471d43b725d1f11cfdf9ad128ba970b4f17ced9dca6876409de16ce6f9
SHA5124a7444379035ce00724622079207542657801039b7e41173b62342270cc0dd269ab971f35afc07053dce585ae38017c0747a5dd8e2e08e44c8de492f846e1920
-
Filesize
5KB
MD5602616b12aa5a30acbdf7e69c9cb9700
SHA119319bab3ea39372ca396e4d17e6655fe7debdab
SHA256725e36b47b436d39c85d0fb9321c132130c5bc8e15386b5ab7c7db4eb5921e54
SHA512f19bcad4bf45a6078350101d04ac84e63a09b1c8e022b11ac680e8556f120858577b57f57595bb2c9cc398d5fd215755f72b34ed16362c0002ce4f7b1131e47b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
4KB
MD5ab3f24390c3d993185fd5bf028bd7690
SHA17e0d7490bc0444608b5b568d1638359f979cde96
SHA2560242d9ae671271278dbbc01c058e6c065e129a9dc66787d1463c7a4d4cd8aaed
SHA5125eb3275db3160e30d17222d68fb583e57a55a64a140011ce9f962bcd95ed425402710be5537861f49af49a4966006403e58973ae5cdde77fea3deaadd318f822
-
Filesize
5KB
MD5f624f21539655258e63ef088fe0dd9a3
SHA18f9b9321ef31d58c6b7f3b015f94728712e36a83
SHA25669ddb6cdddb0798ccd87993a778e8b4a8a4e665b68d991dd902f65542259bde4
SHA5125aa1e573cd7f7d763d08bfe1e39324aad5bfb6358556da3d8721017575062245a14d4a25ba88f29759b3205194b3016236d5c846e07440f6c998382162c667e7
-
Filesize
4KB
MD592f1b452c3fdb81512949dace88c8831
SHA1a262978d421edb81b5e08055484302a83ebf62ef
SHA2563a504f374ef63aaa34008e27f5dcba1e31dc4d82d57f9ae5eac57aced61ba0b1
SHA512739056d8aa9678b8bd3df95f67d2b383c0928ce0a4a8bcce75e0f819fe8226f9e8091ec02b81c540a2c305b425a15082e5f0b9e6a71eaf7dcc2c418904f0f853
-
Filesize
4KB
MD58f60129a76ebcc1c0f5a13965f5dd07b
SHA1f8f1e9033e57c15d41842c2bf9c53dc4dd9f9b2b
SHA256f08d4341c3f4de32e7ac0ee28da0d478cfd8b62609da2aff917720b1660c2f67
SHA512b692a831085471761b0f215389814e92d59796c58607070bd9869f263d9b3776a47ea70eadeffd1c706263a0baa0880a0a4aeb9f44922702f9dcc4eac375b598
-
Filesize
44KB
MD59f7320825460d70bfba94d79682e3130
SHA153ca637f17617ba6f87310af457d8a4cb4e220cf
SHA256054df8930bae3b12b1def0f645633994f24ed8ed4f01aa94ad220376a68da9ee
SHA51290b0db7b68b1e7a9c837d69ad902907a08b1c6fdad9bcace84e1bf9da29e6d798005e38137a62233d9ebe4c0f4d7cea155dffbb60231b9335e91d302e5bf667e