Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 10:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.aartech.ca/zwave-computer-interfaces
Resource
win10v2004-20240226-en
General
-
Target
https://www.aartech.ca/zwave-computer-interfaces
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 3748 msedge.exe 3748 msedge.exe 1612 identity_helper.exe 1612 identity_helper.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3748 wrote to memory of 1312 3748 msedge.exe 85 PID 3748 wrote to memory of 1312 3748 msedge.exe 85 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 3864 3748 msedge.exe 86 PID 3748 wrote to memory of 2472 3748 msedge.exe 87 PID 3748 wrote to memory of 2472 3748 msedge.exe 87 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88 PID 3748 wrote to memory of 208 3748 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.aartech.ca/zwave-computer-interfaces1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb10146f8,0x7fffb1014708,0x7fffb10147182⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,15847250974886471479,13850022884404155275,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5881ec471bc1b36e35dd5c1c78d7e888c
SHA13c6e02d4398b12d549321bfd67a434e902136d5d
SHA256f38273f9dffb493b3f21b741b34e4a364c23ce9ed5d99723b8ac03c7c5522d73
SHA512bed6f3f5d864ac82f32471f10c8a1f3373784c8f8eee880ba0bee6402288b42f7c68dc1fb5f72410fc1a117d7f468f94776b6a22fe05d53a9b431599a1c4fa45
-
Filesize
3KB
MD526da8252afc88c68c3f6f147b016ef63
SHA1e786c2ee2a4058471f58b2855b20dc57daf5dfe7
SHA25619d5583d2a924797afe7195b9467ad5e1e79a6dca6cbc1df6d1ac5cd201d0b70
SHA512ef6a4ec9c9fd332b74b464dbe4771daa1f937b31c4ea7daf4a2881fee2b41e8c244535dd03b3349239b65513ec48934af68817d9c4d232472f5539cb072c82ff
-
Filesize
6KB
MD5a06dfe7ad1af168fec79663426df9ae3
SHA1d8265b89c55efbfc02b90fe68056d696ac393d3e
SHA2568f92516d504a80c7a13024a6b7cf3874a307ced270741f29c39fb048cb58587a
SHA512d7c68476c55a9acac13af9e4ed667c828ce1126f0c10a31b518b14b6a08b1534d3243d353f00c5f4725d5ffc361521f9d315489c9a1d67eb5c6181b6f6d5d49a
-
Filesize
7KB
MD5583c5ef2eb64691673980a15cb735484
SHA18f0e7082d6d0a351657833ac8a0be2982d7e8dd7
SHA256e36993b0598510eb7de395346120c0b474a3c9e65813164fac3aef3e469b3cac
SHA51237f9c7068bbf621713c686b4c24cefbc1754c438e16bcf048c5e67f8627bc1ecaf1a261bf90b299bda1408a675d7208edb72a82fea91a0559386237db342e4b5
-
Filesize
7KB
MD5a7cef94c18a67e9db760dcaf5b149ed0
SHA12139441d32bb9b772e8669321dece25d8bc0cc44
SHA2560ed5d6e8b42ce5c05e46564adb28d2af81dc47ff62f1c856d91bb8f1a0700b95
SHA5128ef71b2ff1065d1b8e07ac6616c1ac10f17fb681c13fdb15d564d3e62e65e753b3ade30daa400980c2c58d84fa1cbdda10a3aeb4926399eb572b4c130e9cdce8
-
Filesize
3KB
MD5bf556ae6524874bc0e3cf0f681c99ec9
SHA110cf34dec74ebd6008e3d95a1efe2727db155a8d
SHA2569788c4a9537e3e735d476a3fb06e4726e51b3ccc71dbfadab729b1ce408dda0a
SHA5123b2676405b598971192ecea896999b0c0ee90698b624c48e2f0c543da6b152e776c9d268fce03a8820266962dc126023168d625a9061da4561e3941eb1fa0715
-
Filesize
3KB
MD54925fabaed94026133d404035a2f4a3f
SHA1e18a4922745eebe752af013cf62e83d75053c796
SHA256d5a17421f595f3311bd86914c7cb4f2a73c61a4207d550e1f6371aee5d3b1d9b
SHA512b3d27e47675a2151d4efbd71f2d33b88db1f5b97cb82d0d230ec3f545b91361baf5a342561b88ce34d43cf34c3a25563798259327cd20e2b5d4e298379883f87
-
Filesize
3KB
MD504953dcc6a4a933a050cefba2885ffd9
SHA1d85b8c77d16f23dcc49aaeb2dd56b17c0ca2437d
SHA2562eab9c29d6578ea2f583f36f8f9b8ec3c70031c2f55e8c915ecc83aa6e987d4a
SHA51255a63aaa06eb8b631e80ab4af4fddc8f1a8365d60f761f708b4b3111f24c7e478f268e28bdb745633103899d717022502ccb32640b6d53ec8706f9e3eb81733b
-
Filesize
3KB
MD587eb97f68bfa78a078e5c1d6a6419ff1
SHA1eaeebd599da4f0dbb848dc5797e373db0c01ac92
SHA256c93459ee20a3413738e046ae2661247a2c27b46c99c9083de088ec84b06a1b9f
SHA512238648376e81c1f5258ea6f925ca982263f43a38f082ec26212e0b68c3c68e1fc62bbf5cce59e5eb7cddfcb8493cfc898e8bf569296ca1628578c67aac39c069
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52854db71c56eb8d13948e46aaa75dd27
SHA10109ec5231a7dd97047c3bf70ad9a91a4c71c98b
SHA256288b2a3d62ef973d5948db8f48aa5a2d0589f4575fa9891f02d638ea283f10ea
SHA512dac084472437a41b24d6867e080a007e97b4430dcc5faed1171109a5e67964fa3db8470727e2149acc0aed882a47b8b334060cf52242e7725b6a29f593d27ec8