Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 13:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://corpwargaming.sharepoint.com/sites/ColdWarGameplay/Access%20Requests/pendingreq.aspx?mbypass=1&ApproveAccessRequest=true&AccessRequestID=%7B15A369A9-4C1B-4F81-AE4E-D1B0C2168F1F%7D
Resource
win10v2004-20240226-en
General
-
Target
https://corpwargaming.sharepoint.com/sites/ColdWarGameplay/Access%20Requests/pendingreq.aspx?mbypass=1&ApproveAccessRequest=true&AccessRequestID=%7B15A369A9-4C1B-4F81-AE4E-D1B0C2168F1F%7D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4812 msedge.exe 4812 msedge.exe 1792 identity_helper.exe 1792 identity_helper.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 2080 4812 msedge.exe 88 PID 4812 wrote to memory of 2080 4812 msedge.exe 88 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 1952 4812 msedge.exe 89 PID 4812 wrote to memory of 4608 4812 msedge.exe 90 PID 4812 wrote to memory of 4608 4812 msedge.exe 90 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91 PID 4812 wrote to memory of 4492 4812 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://corpwargaming.sharepoint.com/sites/ColdWarGameplay/Access%20Requests/pendingreq.aspx?mbypass=1&ApproveAccessRequest=true&AccessRequestID=%7B15A369A9-4C1B-4F81-AE4E-D1B0C2168F1F%7D1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8939d46f8,0x7ff8939d4708,0x7ff8939d47182⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,565717848218753295,6170528171253350818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5031530a6a76ff7322dcb20ab8892a262
SHA1dcf3f2b6542a14442701d4afd4f4af4ce8a561d7
SHA256d5fc23c50a92b201c646ea58b5089f3b29f9f97c61e40f567ea0f0e7b9039590
SHA51265f871f7fbeed8ac6ad9b88740320f170a87bdcb93b79a359f2fcd8888a373cb9e4f9ba2928b031d2c41c5d8a99cad1d19f44a8999852eed8acf902da397a37a
-
Filesize
359B
MD597b70b2f986870be16872f0d08cf96c4
SHA136b1178e32999abc852092420a14e2fab27f68a7
SHA2565676235ac18216520b9ea6cc3adc1606ff19430a581198528b03a2690b755e50
SHA512d12482875320fcedfe979a469125b48e0fae685427138cacb675144f2226ac045f3a603835cc6755ce4a4ee2ec3558b22974ab63673e6b6a49b76779688e04d2
-
Filesize
6KB
MD5f3420d964a7d1471dad263f24d26d6ba
SHA164a057dcaa268fc23c7c2fab730bf230ba062927
SHA2569c6b633ab889ac56fdf8f5460aae4ca88ebf75c0b5ab0c0d0caef1f79b59df6e
SHA512423eb2c5060340dccf3e78e3a5a6b76492666d3d610acb22756bf5b10d560b3cdb82a18f09f5ba0a3117f5a755e5fd08c098ea5cd28ebca988325128449c6913
-
Filesize
6KB
MD509c33e19dd94c1414fcea6f880871415
SHA127c9a99257bd0533cddebffc2fc41a500a0e978d
SHA2564ee67d3ea92693f2276f976fc022ba73be7a5d81a53cfb47149f1064c3a9d48c
SHA512982ca110fd9e51101f27b5efb52071e52c0d9add7bfd384ee33c7de9ef5a5641dcc3c5b6ad2fe3d20bd28557937761dddb85cb83878ed80f5fe23ad6abb0a79d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52e8d79452df997fd3d8fd49304e2c456
SHA187ca07455ce69b015d9f541e8363437da2f16517
SHA256aeaccc05355f5520958e79dbac6c3b35f3441158b850fcdc6e0a35668f1d692e
SHA512699ff57e6e6c41bfa83695d80d9a5e20e32aa1d2ecba562ab079c487b4e1b49e4359d22d7acbda3faae14d0d6d2d9321a5c539c36c97a9d64c99369b9c9e15e3