Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 16:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://leadershipvisionconsulting.us2.list-manage.com/track/click?u=3680428d4fc1376bead9b9c9d&id=815a86227d&e=6c69a8cda8
Resource
win10v2004-20240226-en
General
-
Target
https://leadershipvisionconsulting.us2.list-manage.com/track/click?u=3680428d4fc1376bead9b9c9d&id=815a86227d&e=6c69a8cda8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 3540 msedge.exe 3540 msedge.exe 1728 identity_helper.exe 1728 identity_helper.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3540 wrote to memory of 1228 3540 msedge.exe 90 PID 3540 wrote to memory of 1228 3540 msedge.exe 90 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 380 3540 msedge.exe 91 PID 3540 wrote to memory of 1600 3540 msedge.exe 92 PID 3540 wrote to memory of 1600 3540 msedge.exe 92 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93 PID 3540 wrote to memory of 4004 3540 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://leadershipvisionconsulting.us2.list-manage.com/track/click?u=3680428d4fc1376bead9b9c9d&id=815a86227d&e=6c69a8cda81⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffd331946f8,0x7ffd33194708,0x7ffd331947182⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:12⤵PID:596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9539492311352791049,15098038011744059988,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5fb689d94d14c1b44ed99fc0f96da8748
SHA1ed12530c8df8c415c94310cba9fc38d42dda17e0
SHA256e28660b9b19d14c045b065af27a986beec7c9f5f979221571a3b621d38847cfd
SHA512dcd0c17a180d887f29599c3bf31d4b44ecfe1330b9b7a5ba27ca56d8cc32e68d15baadead62904bf2743c0642f6dc2e89ecd57ad46e3f15750f9da96d89ebe60
-
Filesize
1KB
MD547da073b790c8c9acbbbce2fd0c1ce45
SHA109a1684ffa45621b80123af0e8653623340aaefa
SHA2560aab7077bd425c6de684a3ebc86587ee1a95a4ac467017a4ec99c9e224a34845
SHA512e0e6c22b5a1ee93e30fc24fab5c122b56d4867cf6dcd03d32b7b016d98a4b2db45a82c24bfcc788b60c9a33c30a706b9d09b4bdb55e0a59b9a46c272a77e9a54
-
Filesize
7KB
MD5284d88ab6093285d4c1b07bd7ec7eed7
SHA12afc441a98f1d1b2248cd0bfe5bbda0b1c345526
SHA256637fe4ff3d951aba21680b36111c3c63b1ea241be555b9b0d93deb619261dfe1
SHA512599507523da25043beb979f96cf0dffcc3ae2e57607e185c17b0d502ce36c79672c8b09716390c23546250f8bf14ddf52bd5b99f14362ade8acdccc663165622
-
Filesize
6KB
MD5b66d7697c930455477c5a9f04e0c229f
SHA1c5550842b00a5e30b5ffebcfe246b689b955e011
SHA256103af212b322577e79fb2233d21c48abd448a2be91ba3728894e851a802c4dad
SHA51248eaecf506ed27782d82708a7a76bba626307b4e9dd303e8affa06861d0349486f4d715b6927c6574fb66d3ccc46fd2917d5ef5bf1edac22afb0ad25ad91d27e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD588b6b3d2e68d78646485215f6330b46e
SHA1424ecaae84bb936fae7a4707ecf84290fe571215
SHA25617cf3a321c3f25faf55086d8952066098bad74b4cae942b3da09f0064d023085
SHA512d4151396561bd528c5dc2cfe75b11062ec1e6e59796512cf4095296e41d38ca18976e2078cbe450a53c81ab84c5b49832b202d6c007b2adf73e4e41338b0bfa2