Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 10:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cskkf04.na1.hs-sales-engage.com/Ctc/DM+23284/cSkkF04/Jll2-6qcW7Y8-PT6lZ3mGW1nP_J_80XKZfVZ74_Y56rnBkN7NJSRBW00sFW5ClL6C1jn4MZW4ktyBj1KJKnGW4psMm41YnvX0VX_1YR5-Rc49W53PXl34-ymZKN1M6Rx54TbsRW8T-DG639msmPW4xY_r646cB7xVS2ybw2Km88hW92xx6c8jSmSvMctnChyjTM6W543cW13Z9cgTW3l5ZJT4c9mFVW4XBy9S3RmChvN20JWYV_G5-nW2RmMym5vLMwMW3Vdfdx3F6WnmW8yVpQR6sVXXbW7JkRtV1hlSK7W1zDrXK2BNP_6W6144cB7C6rj2W82GQRq6C2cJvW98F-TS5Swp6hf6Gn9KM04
Resource
win10v2004-20240426-en
General
-
Target
https://cskkf04.na1.hs-sales-engage.com/Ctc/DM+23284/cSkkF04/Jll2-6qcW7Y8-PT6lZ3mGW1nP_J_80XKZfVZ74_Y56rnBkN7NJSRBW00sFW5ClL6C1jn4MZW4ktyBj1KJKnGW4psMm41YnvX0VX_1YR5-Rc49W53PXl34-ymZKN1M6Rx54TbsRW8T-DG639msmPW4xY_r646cB7xVS2ybw2Km88hW92xx6c8jSmSvMctnChyjTM6W543cW13Z9cgTW3l5ZJT4c9mFVW4XBy9S3RmChvN20JWYV_G5-nW2RmMym5vLMwMW3Vdfdx3F6WnmW8yVpQR6sVXXbW7JkRtV1hlSK7W1zDrXK2BNP_6W6144cB7C6rj2W82GQRq6C2cJvW98F-TS5Swp6hf6Gn9KM04
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 3032 msedge.exe 3032 msedge.exe 4372 identity_helper.exe 4372 identity_helper.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3456 3032 msedge.exe 82 PID 3032 wrote to memory of 3456 3032 msedge.exe 82 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 4936 3032 msedge.exe 83 PID 3032 wrote to memory of 1660 3032 msedge.exe 84 PID 3032 wrote to memory of 1660 3032 msedge.exe 84 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85 PID 3032 wrote to memory of 1152 3032 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cskkf04.na1.hs-sales-engage.com/Ctc/DM+23284/cSkkF04/Jll2-6qcW7Y8-PT6lZ3mGW1nP_J_80XKZfVZ74_Y56rnBkN7NJSRBW00sFW5ClL6C1jn4MZW4ktyBj1KJKnGW4psMm41YnvX0VX_1YR5-Rc49W53PXl34-ymZKN1M6Rx54TbsRW8T-DG639msmPW4xY_r646cB7xVS2ybw2Km88hW92xx6c8jSmSvMctnChyjTM6W543cW13Z9cgTW3l5ZJT4c9mFVW4XBy9S3RmChvN20JWYV_G5-nW2RmMym5vLMwMW3Vdfdx3F6WnmW8yVpQR6sVXXbW7JkRtV1hlSK7W1zDrXK2BNP_6W6144cB7C6rj2W82GQRq6C2cJvW98F-TS5Swp6hf6Gn9KM041⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61f746f8,0x7fff61f74708,0x7fff61f747182⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,1049284182159303339,2796824536564377156,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
1024KB
MD5f5b64a920166559f5c3291af1495457a
SHA142fdb732b0930729f6e381ab393a0295189d1075
SHA256e5fc4acbaae4150df8f10357e72e3c6b51229abb46fdd6bcb15b906f6d115d9c
SHA512a014ca2478d751d0db78077ec38debc6c5caebbb758f58c0ef06d8adebb63738b13e73f702694d2a1e947e5d2e19d0607553b5e4511372507fd60f399f62d364
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5540ee222902546750240c9d799c23be9
SHA112081109928a51fe6bfbddcf14fcabde45007d43
SHA2564762595365f3cb3368f1874bff60ae6265e88b32f6e67c9047a68d3a94875a60
SHA512fa3e131e012dbbaa6a021759be6cf76b0e1bdf3d94357a449485a63da5f708b47147b98b6bffbd25373ff1153cbf1d8bd5ec8811e60851ccaada6da2f538c8b0
-
Filesize
436B
MD5d168028fe6741a92b9f6a7f016bd726e
SHA1b62197969b52eee52f72a3d08ff10c81460ef5ea
SHA2564064d466dba7821f05a56e51b9e3d3769a2deb651cf2ba502465dc32a0bd00a4
SHA512f8680ca2602575db6da79db1b18fb6b79724a19379bba3410b65d9cac787041088a84d5bad1b978e34e63ca064495510bb958375cd1703df20829aff93ec5cd5
-
Filesize
5KB
MD5081a72eb963d8ab57fbcebf62609e660
SHA1a6c74ceba535a9cacb2bd024986b8d84ac08aad0
SHA256c85e37c55c5100f219ca15823c3ba08a8e37608c774643d2f71b79962d294f39
SHA512c16ed97829f19c8666a3fe5f5ba1555b01afb16d9e6e859476b07530a4cea91990364196b86032af845808eb46c6af6f7978fadb72adb748d340a8deb42dae09
-
Filesize
6KB
MD532e01b7dc4c60a84f542b29fd0707894
SHA1ad56cfc170e6c5b9dae80d34634708b0a75c6374
SHA25624a1115c284947d83223c77c26f4501040ea992a03bf13df9820e8e1d96d5278
SHA512702e8b875cb18f4397e3578ad51604e5cf340d8064051a0358e2ddeca20f9b38605eeed4746c5be9db4ab23a4407be4eae3dd2773b47227d800ee166388907d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ff92f8364dc48547eb243e933407297f
SHA1e6e48c3c216eb5537d57e9f9e320fb7fcc203223
SHA256caad9d667a934762e96835ccd7a71d66c0e903bd0332905bca23013167aeade5
SHA51278a370f4605cb0e5f77db2b52ad599a0c3a05744846be7941c3f18a7cddecb8e890a81b2eafff0e402ddb9accf220e12c6af2de39917255280a3ef6dcef6c59d