Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/03/2024, 17:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://weareams.ca/
Resource
win11-20240214-en
General
-
Target
http://weareams.ca/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 412 msedge.exe 412 msedge.exe 2464 identity_helper.exe 2464 identity_helper.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 412 wrote to memory of 4892 412 msedge.exe 80 PID 412 wrote to memory of 4892 412 msedge.exe 80 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 4140 412 msedge.exe 82 PID 412 wrote to memory of 1340 412 msedge.exe 83 PID 412 wrote to memory of 1340 412 msedge.exe 83 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84 PID 412 wrote to memory of 4864 412 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://weareams.ca/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd2eec3cb8,0x7ffd2eec3cc8,0x7ffd2eec3cd82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:82⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,18318858958000494069,17509408383701695276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:4708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ec7568123e3bee98a389e115698dffeb
SHA11542627dbcbaf7d93fcadb771191f18c2248238c
SHA2565b5e61fe004e83477411dd2b6194e90591d36f2f145cc3b4faa20cf7ae266a75
SHA5124a53fbbd7281a1a391f0040f6ff5515cedf6e1f97f2dae4ab495b4f76eb4f929dcda6b347f9bf7f66a899330f8897e1ed117314945d1de27b035cc170fa447d3
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
4KB
MD55dcb8a624b8aeae13873ceaacc6f6c1b
SHA1500f3664ca3543361a74b7388dcd63e5cef1f97e
SHA256abd158da2fd54ee2b75cafcab0e867b904744f77bd97f5c7f62bd9f21f72e964
SHA512aca08fcf769c27f059b4a7ab722fb972c339553b98dd32e7bfcdaf1d4a6cf92c0fd9eff4fcfe91dfed2a566378bac9ce876985058076750cbf3a32763aa2b678
-
Filesize
5KB
MD5760b944f00472361c008463e8a5021dc
SHA178de32e9e65d2c7284b19ee4bc785371a7362c3d
SHA256c65991dc70ffb4f1fc0d60895ed9341137b64002242a212170030c7a7c6ccd47
SHA5126d62e63a71516936ca96e9372c211b6e8b4bbff097c125e8ae12744df3cefa99f9ae9237bb7620f4d5731c9eb13c96e2a095aef23f92adfe38578ed0c575e1b8
-
Filesize
25KB
MD50ba15f72ffb0a37243558588d3e78221
SHA1814bdfffd723f7de9f8d6d6a0bc8d85a9f275cc0
SHA2563d0223e1f8bb35870db41872cfbbe467f65bf9a1208dcb4d4ad874e250ccc10a
SHA51202b168ef9cc226a08955092173c3745a55b28faa438b8152acb90d3bc1d9f433de7d8341def8b452db1986392a59cabc7c69689ad00825c58371ca78021183be
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5c9d3f4f2e4f73b1055e4bb2c2103ab9d
SHA17658c1ab007e16dba637587f2de5e32fc0b019f2
SHA2567c3f790b45488927744cd471b55ccc4356ae5409ba1436483bbd3364242b7fca
SHA5127bb1b85586c60a1474bcab499b09e306a62a2ee94b3d2dade01f753362dbd6ff4b71d5651a6db9e8235a2eee9e692b26cd742ef9f56b670fef80fa0d7f9426dd
-
Filesize
10KB
MD556412f90f44fdab64cb770480e704357
SHA1ee56ad04ac69e987b9cad658376871a994a589b6
SHA25633d4cdd49cdfe4be13b4b9adb072c3457b3f3e8678173323b0a6048ef3c66cc6
SHA5121743becb624075b9a4cbdfcfe19bf36f531a920b076bbdd20a443971c005a9b530c9bfcdc46fbee1a62eec5138cc838706a587c6f01e0125e0b74532fe9d5a45