Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 20:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://support.cch.com/productsupport/outsideLink.aspx?4508u=//baidu.com///link?url=H61PW_a4Jq63N-cMqBBVw6H6qBkqmDOCTKFhTdOt3eNej2BVLwMQk3ZbEp6MfPAo%26wd%23.ci5uYWJpbEBjZXF1ZW5zLmNvbQ==
Resource
win10v2004-20240226-en
General
-
Target
https://support.cch.com/productsupport/outsideLink.aspx?4508u=//baidu.com///link?url=H61PW_a4Jq63N-cMqBBVw6H6qBkqmDOCTKFhTdOt3eNej2BVLwMQk3ZbEp6MfPAo%26wd%23.ci5uYWJpbEBjZXF1ZW5zLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3424 msedge.exe 3424 msedge.exe 3672 msedge.exe 3672 msedge.exe 2544 identity_helper.exe 2544 identity_helper.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4040 3672 msedge.exe 89 PID 3672 wrote to memory of 4040 3672 msedge.exe 89 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3032 3672 msedge.exe 90 PID 3672 wrote to memory of 3424 3672 msedge.exe 91 PID 3672 wrote to memory of 3424 3672 msedge.exe 91 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92 PID 3672 wrote to memory of 3308 3672 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://support.cch.com/productsupport/outsideLink.aspx?4508u=//baidu.com///link?url=H61PW_a4Jq63N-cMqBBVw6H6qBkqmDOCTKFhTdOt3eNej2BVLwMQk3ZbEp6MfPAo%26wd%23.ci5uYWJpbEBjZXF1ZW5zLmNvbQ==1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb073646f8,0x7ffb07364708,0x7ffb073647182⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9898179641158747685,3422308423069463928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD5620c96475e7056e70bb2b44e3b3e5171
SHA14945053e19f4f71cb1db25af354f70ba046a0be6
SHA2567b5c8397c008ad0305be0a57fc142553f7f1984d2b0a3332d7ed8bac2a3a1ac1
SHA5123658134b23002f555bb1f900576a1c3bbc037487a8394224cbe05e5a0fe2bbb3e9a493361d2e2ecd9768e9a7cf0110cf11a23e3e8d9adaa2ea9aa788ee4c4c0a
-
Filesize
2KB
MD5dd94da8f1d55fe9db010efbb28ee45d6
SHA177705b09005eab0e36686f1374e61989caf2b0ce
SHA2569c36ced5499a0033f0ab862b1d64bc4f7bc0255f01f3bc1ccc33ff5f80bdcdcd
SHA5124822cca0f94bd4d41a12afd37f918694d57f4a63e74c10e11abc11646ccb8ced1894198f881808c4d9343bbebf14449cb2842818e03518d54301604db587ddf1
-
Filesize
6KB
MD51812c732d53ee14bfffc3fc139421de6
SHA133fc2b31cffd0ba259aeea79030a4a3c5aba22e3
SHA256b492f0459407096f12c9e813fd9892a4be67e46801fbaf55e1407a8ce7837173
SHA512c645041ed702b7869e8edaa38b7721dfeb2240d6a71a1561568c2702747df2b86621dda0b9b7ae1a11588cc7c2724def8062f628bf45c1ea05be23b8b1c49958
-
Filesize
7KB
MD5d7bd8d1a33bcff6abba8c933035dbbd5
SHA1958f8545dd6ec1ce3dbe99d3d58f8dd057f07d0e
SHA2565a5eddf8a936740c0013360edc554995f805652b3a1831c7c87fd89cc533cdd1
SHA51256ec5dba0a9ce3694b45ea86dde36a7cbe147f57d7fe0967de35ab8b9f1f54392b6be0f70e8cc9920d11fc98c19612f7ecf2a84c15e3050b0430321ca353e060
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD572fdf505c33c0e8fa85759ce5961c191
SHA1f20599de31a1a49733a108629103d9d28b6a9c82
SHA2567f6cdd39d22100d821d3e1f9c84a960ddd3a4e2ec80493707bacd163d76bb7be
SHA5122323fc82daa6b0a58fff926962e7f692df60713ba52cb3d0f01eabd27c768292fb8ff860d4f64e3fc629cad3e4ea2bc26e0d7b2a29a97771598955a7cd2d9d71