Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 04:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.cia.gov/contact-cia/#
Resource
win10v2004-20240226-en
General
-
Target
https://www.cia.gov/contact-cia/#
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe 2976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2452 2976 msedge.exe 60 PID 2976 wrote to memory of 2452 2976 msedge.exe 60 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 2748 2976 msedge.exe 92 PID 2976 wrote to memory of 1896 2976 msedge.exe 91 PID 2976 wrote to memory of 1896 2976 msedge.exe 91 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93 PID 2976 wrote to memory of 4236 2976 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.cia.gov/contact-cia/#1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffeef8246f8,0x7ffeef824708,0x7ffeef8247182⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,3509928363914305030,260096110426698444,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵PID:2496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5ee4f41c7fcb92820143b772a1d698a9e
SHA1f3b6e952e9f7ac94864cf250db667108a2a62101
SHA256c0c425878eb6de4a300b08214bc54d3db4baae3bfe1d67c04e3a261cde6ff531
SHA512ef673660450a878d82fcc3279d92b0fe50328a80f2da93cec942d8006566be39e439ca437391aba0951c4b8f06619ca77d0327b64d7b9edfd27d9e906b4cf8ea
-
Filesize
179B
MD539ea45e53607208ce89a33288f5d627c
SHA10d9a34f8942065892aa6619fb7615f4ca112080e
SHA2569b9bb8052a60100a277a1194f9ba6948777ecf015b23f8296f1e47cd6291d743
SHA512dcb0694623c65f0c65f8d0ae64e2f476c58ae55388ee0894ab0fd52eadbcd1238f3e3e11ae0ba252ec043b00024ec6fbd5683b5b81d10c89430bd049e3e2a38b
-
Filesize
6KB
MD5276ac414111a75a7962d4793f734fbd9
SHA177b2f95741d8687f2879ef0bf788a1675ac0baa5
SHA2561144e3f5808efca2ec0a20a030c8c66b63c1ae2e264ca5936844fb3352929626
SHA51289d57edebe28868fafdd8be159bdf64352da95fbed2eb85d4b4175cc46b8d78a403ce61b746fa378b207b28b8820faf675a703ed3aa5bcbedd748fe20b763ddd
-
Filesize
6KB
MD5ebfb1064ab093927fdf44f5838a34e9f
SHA1e522fbc13b59796395d8845e769c7b8c1e3b5541
SHA25678fc4ef0d965ee768f1bfeb1e4246be01f8ae6c8b480c3f00aae4cf891a31f15
SHA512c7c2412f7d05b1bff86cc555eea94c86fdb5cd0989130e2d0351faa52954dbfd70e213e486231f17ef88be6a2a65ad3099f8bc451059421eeb912b081a8c6714
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD552a2d102b2a72737ba1bf7dec223e427
SHA1c4e6e28f77617c3607f57118b762a24e5231e882
SHA256725316dc84ef8d6f945d74ef7714b93dc48f807522feac45a9e8303df7603f6b
SHA5121a0aae0e4d8d2cb8ccf1b950033a3549b181661264edf7fcd3fff2fe3473c1bd2221d070680ec36a874d451820880128b45e40bfebb7564f4d7125cf7a8457fb