Resubmissions
13/03/2024, 08:01
240313-jw3cmagd2v 1Analysis
-
max time kernel
25s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 08:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://amchamcambodia.glueup.com/track/rd?type=campaign&lid=2&tracking_id=930:257126:efc4e39f-c803-4e0d-ab4a-d7b22effa9cb&redirect_url=http%3A%2F%2Fmaps.google.com%2F%3Fdaddr%3D11.576591%2C104.925401&ts=1710126001&ps=U0hRZEZRK1Jib3Nvb0VLTlJKYWRPV0dhb01aeHRxVnhBL21USU8yU0ZsYnVRaHp4U2ErYWdGNTU1V0N6dHhPUHZlMFBaTXJVREpoV29IRXd1VldhY1dhc3UyOHdzaFJ6VGdBc1JwYUQrWWc9
Resource
win10v2004-20240226-en
General
-
Target
https://amchamcambodia.glueup.com/track/rd?type=campaign&lid=2&tracking_id=930:257126:efc4e39f-c803-4e0d-ab4a-d7b22effa9cb&redirect_url=http%3A%2F%2Fmaps.google.com%2F%3Fdaddr%3D11.576591%2C104.925401&ts=1710126001&ps=U0hRZEZRK1Jib3Nvb0VLTlJKYWRPV0dhb01aeHRxVnhBL21USU8yU0ZsYnVRaHp4U2ErYWdGNTU1V0N6dHhPUHZlMFBaTXJVREpoV29IRXd1VldhY1dhc3UyOHdzaFJ6VGdBc1JwYUQrWWc9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 1648 msedge.exe 1648 msedge.exe 3332 identity_helper.exe 3332 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2108 1648 msedge.exe 88 PID 1648 wrote to memory of 2108 1648 msedge.exe 88 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4660 1648 msedge.exe 89 PID 1648 wrote to memory of 4128 1648 msedge.exe 90 PID 1648 wrote to memory of 4128 1648 msedge.exe 90 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91 PID 1648 wrote to memory of 4120 1648 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://amchamcambodia.glueup.com/track/rd?type=campaign&lid=2&tracking_id=930:257126:efc4e39f-c803-4e0d-ab4a-d7b22effa9cb&redirect_url=http%3A%2F%2Fmaps.google.com%2F%3Fdaddr%3D11.576591%2C104.925401&ts=1710126001&ps=U0hRZEZRK1Jib3Nvb0VLTlJKYWRPV0dhb01aeHRxVnhBL21USU8yU0ZsYnVRaHp4U2ErYWdGNTU1V0N6dHhPUHZlMFBaTXJVREpoV29IRXd1VldhY1dhc3UyOHdzaFJ6VGdBc1JwYUQrWWc91⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff8bd3646f8,0x7ff8bd364708,0x7ff8bd3647182⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,15867203399066031225,7370319642611601821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD58b162e46f5aef646a2a56b0179f8fd5e
SHA120eb2ba722a64c30f07bbf9bd568e2fce11641fd
SHA256200cec8115626273ff84e7d8fbf9209c6fad7ec69d75e4b6070d502ff24ca6f8
SHA512ec2f58e114e74cedca1e982b8ba7f36d3ab29fcaeb5433ea0a739ff6c6690163b2675ad763f531ff218dd0bd21e7477ceff8923a27eab064792dd85f11d473c8
-
Filesize
6KB
MD537079a3a5dfa83751a7c680d4aa69bab
SHA1c8089d02f4230689385848d5ea630de94663aa73
SHA25639fdbea9c2b7e857b498789307fdf35a10c532540e4444441ff965dae81da2c6
SHA512fc2bdc4f2383bc4e299a75039b94c96c0bb231f62a44bff6b62261bc3c333ff15ff3a28875e45c1c636a1e12767fc6bf2f193f522b20650ee91d8ca588be103b
-
Filesize
6KB
MD55087449e849aa2620bd7543e417d14ca
SHA1f9b24c968639ddee3acaa0324fb651ebeefcbc09
SHA2566c924d0ade6bb55e5e55d009246ae2b0eaaab3086c2b57b4740c336ba0111ffa
SHA512223732925b3dfb721a9dc6429677f1b8b6af59fc81bd2067141b660e1348be4cf719a2470f93a02241909a907671fa15da5f3ca80a8d434a13ac85bac5918073
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5cf44e85542be264e75d7eaf4bfb5f160
SHA1d11c0ce992a093078a1a0deb2e8ca02c122fb0fd
SHA25618d7704d3387e7faffab0696c7d8e337dcd35a4513aa3ea52afb89222e6b52ce
SHA512a91fc8a4d62864ef974898f06ce330b2c6fce915b3dd472c8f40bce560924ed047efe1bd5dee77eaf6ad731d7823976b432db6b874f7c8dcd81f25e52a5e5b34