Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 08:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://criteo.com
Resource
win10v2004-20240426-en
General
-
Target
http://criteo.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3876 msedge.exe 3876 msedge.exe 4324 identity_helper.exe 4324 identity_helper.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 3276 3876 msedge.exe 82 PID 3876 wrote to memory of 3276 3876 msedge.exe 82 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3660 3876 msedge.exe 83 PID 3876 wrote to memory of 3440 3876 msedge.exe 84 PID 3876 wrote to memory of 3440 3876 msedge.exe 84 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85 PID 3876 wrote to memory of 4192 3876 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://criteo.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa63f046f8,0x7ffa63f04708,0x7ffa63f047182⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,17578290270756091114,14223700246295917362,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5940e2828ae1f85ffa0f6b58470f558b6
SHA169fcb2d85ade872fc40c73c531df6699a325765e
SHA256c9ced24ba80b88c650ace0e9d6747caff06db12e50b64987983f39ca5bef931f
SHA51275aef3e68c4fab6c90c53809341c7eefb3a73aa5b27d8b1ebe06080b2c15ec5daf26852aec6e555716443b65649f832e845606c0724bd02452af55d59d35cff7
-
Filesize
1KB
MD59e7d82348630a0c1efb0d80cbd482892
SHA1966786dba79a861964d946eb52e7989fb757249a
SHA2563365c35306c1795d8db7e173199de1747b82a33b0cdf773e73148ad08a26658c
SHA51214671a62f99228c047edf98d86aaeee7d959ef7dfaa597dacf165aef7c7d5602431779202a979288bceb73408421f7db6f7384ebcf851de3e86dd6df171d5b4f
-
Filesize
5KB
MD50fd2acbb0ca28f95002cea9594c188bb
SHA169d686c56f9cf1eb598bca83227d4eab9d9d5095
SHA2561628e44410f2d52d70d3d32521410e797499f8de547474ec7692c9d75d997a0a
SHA512874f5b865148683ee0405844cf13131f01f8b84a8e8ece24a6ec7b7cd028c53c7f3cee1b2f2c7b1e01bd810267d2ac838b53d95c0c6535d0850d3d7fdd13e3d0
-
Filesize
6KB
MD5c2c11a3b763bf7f179b25385f8b4bf32
SHA18a42fe10ba92d477b4ae2a5c4fcfff1c1a96e625
SHA2568b0a4ef27563c8883a9fc2fe2a39a4f993c7c1054440d6a970de219082e980a3
SHA512ba2e27dd1cef820a80736d7a79f219a7c3850b9f747709e052e578dda9041f2a15f60b5f588c7f46ec43f3392f6347d3cda574529244e2a1ccbdb42882b13e63
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e297d81271de98b0c00a23a3b3aebd5d
SHA1deff9933dd4d8c5fa9b662121d59e3008ed3e72b
SHA25600d58ed12a11d3d9105617c5fbbe458f499eaa7202c12199f52029cb6e7879e2
SHA51207cb76d2cf831e0ebb813753ee3d07a7f13231ca8f4a51fa0cddfa701dde979222814b5bc1dc66534aa69c9ebc149b962e180e22eef940632e5882da3fb1c745