Analysis
-
max time kernel
264s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 16:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.cedpaducah.com/
Resource
win10v2004-20231215-en
General
-
Target
http://www.cedpaducah.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4816 msedge.exe 4816 msedge.exe 232 identity_helper.exe 232 identity_helper.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4600 4816 msedge.exe 73 PID 4816 wrote to memory of 4600 4816 msedge.exe 73 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 368 4816 msedge.exe 90 PID 4816 wrote to memory of 4968 4816 msedge.exe 91 PID 4816 wrote to memory of 4968 4816 msedge.exe 91 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92 PID 4816 wrote to memory of 4620 4816 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.cedpaducah.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c9346f8,0x7fff8c934708,0x7fff8c9347182⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11530155446458914261,4884843509740624286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD50c3c4949783225debc804136fb884d08
SHA1d3dd0957253d93f0ae1b8d2b5f3fedf6e0d78a02
SHA256d6d6280b331eceea7f190c72d136faee7e11b620ac3e6fbdd3720c348a6998f9
SHA5127a6760a5a42b5339d8fbe7cf6c835f54f31acea818b31922ffba3394868e567ba158819d7ab5f54a3b25e615a18b3544e61e2c415cd752d35e2e70633fa9a477
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD54eac4a064f71c90131d61fbc6f4e7aa8
SHA1c76e527e412d061e8a4a41821c3c7bbb1308aa76
SHA256b1e7c54b6e3c357f2b05e6345e0267041fc57344c2bc3002efe63ed29c559891
SHA5127cc4057e4d5584ffb8eb587ae5006565d91c64279a33bdcf0ae88e975ea8a37c8368994f95a06e03cb300a93ef0cd391f7058f1cb75a768035f555f184e850d2
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5a4164314267c101e8d194a1293e6f7f9
SHA1d63fa973bc7aedb78d5127364e8b0d36e14346f8
SHA256e7e9e6c89b9d56e9f7a5158ddb0c6253cf5f97bb33e9b02430284916625345ed
SHA5124c435a46e054e035777adfcc3bdd26220d40787216d151b13b52b06a6ff93da0b8734b00b2f3105d28bdf8882eb680a6945a129d85a035a2b84dabca01d1518a
-
Filesize
6KB
MD578dd584f6769da3467754ea191d1a4a5
SHA149f66f0bfa1e5491ab40b9dd83824509900f9331
SHA256f78538b43c5df31c3519e2f4d91f6a77eb7f5afb44c1494224ca368434fc073b
SHA5129460b706d0696539e7601b294343d8306030c30cba6367efaf25bce36bf5662fbd2d7d06621ec66526c9a52bcf3ab7c0c98a815cab153c305f04fea95d94954f
-
Filesize
5KB
MD54a5bddbb2996c49d000786af505d84b8
SHA154023a262a97b54a9b37641d1d03242d298dd487
SHA256dab5d3a77e2294ea74442ac64b49d587a51bbada376945fa1db0b1540aefe094
SHA5125a046fc2d31a7609d6c707bb489fc7741c73201f220a47c7e3e0f77a6af3932a4da5b8366fe4156368e09c7804fc8b7cea1e093f4f0fc48f9b61325eff225128
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
871B
MD534569e61800d442f676c1f45bd318706
SHA1ca3fa46820e14896ca639082af0a2713b7218a67
SHA25679c34b57559702c86ceb6f97acd89d01ab64bacac6947066c0d575b7fc7a15df
SHA51232e8ce65a6f0b3202eb4bf50e78b80151757d40f9c93a66e51c9035274b5b23490ed3efe9ddab4ffc99cc98ae3a0e9c07c21cf525fa171f83ef218193f150c5c
-
Filesize
873B
MD50ee35ffa68887e07e39710d3e0440213
SHA1ea785a6bb5b80a81f063203c0a1e2b5b00034e49
SHA256cd4f4d3e216634f27fa5741a6aefa8fe48ac74cb0abaaf1a970bc2f1fcb839e7
SHA512e87edccf72f8b9a40068d37372c61698fa9cc408f9606193a123274a76ae7f253e50e69ba3d02de35b48307383b7f592896ffcd1b6b3478c2d82ca05af8c325c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53e54908ea41dfdf65e3346ae85ea0419
SHA1e3838384ff5179b484d384369c02e1d6c07a5a94
SHA256075b6c74be37b5c0101b161b72dab488e54b22cdb3eeef5c11a1539686d5504b
SHA51285685ddd9a8638711644b7f4273e995bed3346594a61e4df6bd1f27eb9bc880e1d3ee4455dd55c8c9901559121324a0d16dc0e95ee690094d3cbee06d763cab3