Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 12:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.rcmp-grc.gc.ca/on/cont/index-eng.htm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.rcmp-grc.gc.ca/on/cont/index-eng.htm
Resource
win10v2004-20231215-en
General
-
Target
https://www.rcmp-grc.gc.ca/on/cont/index-eng.htm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 3092 msedge.exe 3092 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 5936 msedge.exe 5936 msedge.exe 5936 msedge.exe 5936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 1360 3092 msedge.exe 57 PID 3092 wrote to memory of 1360 3092 msedge.exe 57 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 212 3092 msedge.exe 90 PID 3092 wrote to memory of 2716 3092 msedge.exe 89 PID 3092 wrote to memory of 2716 3092 msedge.exe 89 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91 PID 3092 wrote to memory of 2988 3092 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.rcmp-grc.gc.ca/on/cont/index-eng.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9718b46f8,0x7ff9718b4708,0x7ff9718b47182⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1692 /prefetch:12⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14016996499465373061,6871273392061754323,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d5564ccbd62bac229941d2812fc4bfba
SHA10483f8496225a0f2ca0d2151fab40e8f4f61ab6d
SHA256d259ff04090cbde3b87a54554d6e2b8a33ba81e9483acbbe3e6bad15cbde4921
SHA512300cda7933e8af577bdc1b20e6d4279d1e418cdb0571c928b1568bfea3c231ba632ccb67313ae73ddeae5586d85db95caffaedd23e973d437f8496a8c5a15025
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4d14c5d9-2e6f-4a6c-bb6e-fb1df7e7e8a2.tmp
Filesize5KB
MD5ce399e70b646b8791c1caa0241f7e444
SHA1772a50523739be83b50781791fb46f0c57f4eeb9
SHA256dc93ae9341ba1708ae9a727dad18d4a98ca5da5165efa8981e7003b471ff791a
SHA512d31e6db36403fe62de2383da43ace6eb97ff8e4c4f21ea706aa22168c84a42fddaa5fb34b89e66ad2bb3a0b7d5b9bf970ad6d67c58707178aee6e0bd9dfcaa18
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5b4bd3d6140ad84fcc7d0b27ac3f3676c
SHA13b390d282e12cd44195cc760e22e723d42879888
SHA2561a6d0a63083911b296b45db359fad2e6cbfa2ec4403f5a73937aec26265dc407
SHA512deb0a3f59ebdf3702ab55819c69d4c7521f60ee0d3a6744e1fb2af7ab23d95936623b3576b3d2e03bb779226349f0a66c46be11ca7863accd079a40079e823d5
-
Filesize
24KB
MD51d1c7c7f0b54eb8ba4177f9e91af9dce
SHA12b0f0ceb9a374fec8258679c2a039fbce4aff396
SHA256555c13933eae4e0b0e992713ed8118e2980442f89fbdfb06d3914b607edbbb18
SHA5124c8930fe2c805c54c0076408aba3fbfb08c24566fba9f6a409b5b1308d39c7b26c96717d43223632f1f71d2e9e68a01b43a60031be8f1ca7a541fe0f56f4d9f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD565cf9a775f79563610f3ed4efb2dec4b
SHA1e13a6a62d3c3a7b96cf1c58ce0a3799310340496
SHA256d9c340440b9c0506ae86b3c9343bba86c0c21a1c0dd065fb7ad18cf3463f1d4e
SHA512a5b613874e7d9229cd98269f514f91fd793280a736918cb871c825c6113254a1074812a434498b814f73988006d2fabeb3ed7aec46af8b9622f77ee01e5b8394
-
Filesize
10KB
MD596445c08be373cd0ef3b58a75752e2dc
SHA1a23807e0dbf2d1b7ee812a98178d47ffe95f6e24
SHA2562a8f0cd8bf69487aa65b59502c80bc92e3e5753706c7339721a28c924f890641
SHA51210cb1a724ddf0a923ba983b3f272de81fd2514bec1c001532afdd16c5f0116dfaec60839f84c6e4a1c7dd410805f2025bfcf35c277c8cf914215ca48bc70f3cc