Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 16:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://signaturepremier.com
Resource
win10v2004-20240226-en
General
-
Target
http://signaturepremier.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 4376 msedge.exe 4376 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 2148 4376 msedge.exe 88 PID 4376 wrote to memory of 2148 4376 msedge.exe 88 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 5060 4376 msedge.exe 89 PID 4376 wrote to memory of 2704 4376 msedge.exe 90 PID 4376 wrote to memory of 2704 4376 msedge.exe 90 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91 PID 4376 wrote to memory of 4436 4376 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://signaturepremier.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3e2a46f8,0x7ffd3e2a4708,0x7ffd3e2a47182⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17577948137712973566,6528109860521356834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,17577948137712973566,6528109860521356834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,17577948137712973566,6528109860521356834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17577948137712973566,6528109860521356834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17577948137712973566,6528109860521356834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17577948137712973566,6528109860521356834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17577948137712973566,6528109860521356834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17577948137712973566,6528109860521356834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD55b35a649c17d569fb2efafbbd6b50594
SHA16dfe6f7d7f44f76cf4c35cd85001c12975b0af57
SHA256001b0f84c246df40581617d262dd11d1973c4347cc165b88f6429c23fd0611c6
SHA512746b73d912f7ba8f15b2fcceadadafeba8072cfc8db24e4f6efde3abc40d2a9092b019076ffdfbf20c7cadff10c46b29f15d2853913713493d8a392dd5c1b7f0
-
Filesize
1KB
MD54171068540173c49f404201d979f816c
SHA10a0fd5d21853185019b9c045c83a296eb9443929
SHA256d521c166adde3b4146ed85cc09d64c322790a6f11d7d6f708b20dfd616561949
SHA512fa6d14a2e99f2d0d293f0b329f07ad506ea63b913ff09e3defe539a59d25d1655a4f1f5e6fe745a13bb7f3352bfc87f56231e3aa3af5c2af42ad733a545b0ac2
-
Filesize
6KB
MD51df9f1a503fa9ab2ab65ac0ef0484e77
SHA11f6c8722dfe640d5b0004c39217707437237c4f3
SHA256a8456cf43eea792b40490852bbb85241bf3ba279065e815d98c3119626dd6a04
SHA512f1b1418804606d6c1e56b7a434e58ad529a620dc59f56285df13fd345b343cca604d12d2dac7bb9a7e8c9370ad13a3f1a5ef972b219449c21e57fc1aaa1483ff
-
Filesize
6KB
MD5597b033c792308c6d7ad81c68ae2dbe0
SHA1c114d64ed567545eb728c298bc16ff15867baf0f
SHA256d7a1440f36daae862520ab73cd21666978a0b6f79af914b61a3865fb0eae0812
SHA51287dc4e1553ae23d63b5019269ae6a73dd900d088f32fe64467bd9ff3b25c7681e602a1fc09672e9f676738a3741c818a8340d6f57fff6f6659e08db2b902f370
-
Filesize
6KB
MD55d682ed59b2b487aa50aa9d70741f866
SHA179796ffee61fbd6e791ca615847b9b760c01cb6d
SHA25645f379581a71651f28d79ae0d23a620ed81ab19e0c24f55cce547552fb50abca
SHA5128554709bcc4db5bd21ec81c86b7c0b404b7c08b69cbce3b825bef1155add486f14e9d72047ed395a309f642f41cb67594d1f095090b7275aad3f3396067e6cb4
-
Filesize
706B
MD504644ffb4daa5802112421aea4085cb5
SHA11aa80530250a8320c21ea926eb26e8a1a9f33867
SHA256fca3c1a54c278591cac6f46e73507cd37dcb4a6a74916b3502a0f9bfd61cd18c
SHA51294d46be2b993519da0939a8d66428b29ee9a5e36a004a228fa1b0b8de48d7dc376e684b8f7148bffa0d3a5e63addf10a5b86b1c39f5532284b393616d4384a0a
-
Filesize
706B
MD5cf767c8b7eedfba0ce4299fe1cab8b44
SHA1a9c6a2acf26507007f02dece5914dec76d379879
SHA2568e22e27b5e7bf324a62efb42fe46fccc997ff9a74ba5d5879bc11bef8b27d6af
SHA51267d16429e162cb04c6cc20914c71823585c20abae0f3f96ef624162f721d81b4e5eadd50547b310047bca11f5f4204e069c7a82fcac24eaa0dd0e3b72343752f
-
Filesize
12KB
MD5ab344daa01393208d8163cbd23916550
SHA109c08211218f6509c5c321d5ef4972d409c084a0
SHA256c35e4fccb51c19b678174a9703d85a330ed45bdb184157e4f4f2806887f8945e
SHA512850896471830d618db9af661e230d05f039bc6101308c74fc3665f80cc336de6417a97436432ae6fec5e5ca5e254fbfd478d805fc1cd383a343dd7db41daba40