Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 13:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.arkhamintelligence.com.
Resource
win10v2004-20240426-en
General
-
Target
http://www.arkhamintelligence.com.
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 3952 msedge.exe 3952 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3952 wrote to memory of 3668 3952 msedge.exe 82 PID 3952 wrote to memory of 3668 3952 msedge.exe 82 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 2308 3952 msedge.exe 83 PID 3952 wrote to memory of 4868 3952 msedge.exe 84 PID 3952 wrote to memory of 4868 3952 msedge.exe 84 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85 PID 3952 wrote to memory of 3360 3952 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.arkhamintelligence.com.1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16629192753267590029,2919391170665073434,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,16629192753267590029,2919391170665073434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,16629192753267590029,2919391170665073434,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16629192753267590029,2919391170665073434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16629192753267590029,2919391170665073434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16629192753267590029,2919391170665073434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16629192753267590029,2919391170665073434,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
971KB
MD59af407b456c99163dcca293bfa9667ee
SHA1807018cf10358222034a6aacc5627c3c32cd001e
SHA2562180bca2476eec2478822cd31c4f42c2ceebf487cd25f2b0d5f24ee2edb54b22
SHA51291087d3639d39bb7330a8beb77ab0a5775e9bf43b69cfeb30442cccaf0c9503542f2d56d1b8d8556388994dd334727b8f1bbe56b1b2dd2a148041f7c5a23d120
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5d9f29ceec0a9e3a3444d2a04e6137abc
SHA1950b54b18e0e5c51a84b254c8cb4d8a7eb49bccb
SHA2567b2c2d9c07f74abec146d14bff8c5f1e9af10d253c6dda8519c746cbd9ff108c
SHA512f3baac7b9434330b6baa39f06e69ab42f675945df8b27aae25439f2143469baae07544810d32f19714ce2558248413faebbed1df5202acdbecfc5a13255096df
-
Filesize
1KB
MD5601afe86d1eb6c9acf50695cfa5a69e0
SHA11a761bc145800d3bf6277513ccdccb922d138c35
SHA256205be1b0a8afa2f05255ab4bbb1cb0bb1c5b526c96d76bb8904f738dca5426f2
SHA51245e6801e821b9ca96c43cbd6cc660ec23dd1b5ada4a962c0894ad0eb1bfd6a8ee5b910ee85490d0e1daab112451cc3f3fc6b3c4df942a7146fbe064d1cc81164
-
Filesize
6KB
MD5e44ec23accd423615e9096a582bad1ed
SHA1b2bc3a433fc89651495e826337838cde5d18ae6e
SHA25623b72aa2b5eddb0299fc3e37ec0a9d2632589282081e150102af3af358aee9aa
SHA5120cdc64cf385ea62fe9644df43a9c29ef63c510c1e23056d31d49f0a7a0ebf6c03b5b0c169334cd771e389cf92b6838b1346d53d89c38edef2d3aaa0418cbe22a
-
Filesize
5KB
MD543f9a37cf86cf3b807b083cd31d883d4
SHA16c2e3a96bf992ac774c07368071670d7b0a677fe
SHA25663daf816f78d04fdaad37d94a5e4fdaed5e9c71a0d3730fb86dce6d0a4cd4a51
SHA51287573da82abed085edc27bed4af6b92132f5f918b5b98d53a217ce4b5fc03d3a71293d3690a2cebe3fdc83117b4fe74e8611dbc774d9fee3cce3cd599707012a
-
Filesize
10KB
MD5a7369e5c852af7d0231e61cdf2f582ef
SHA19d8c6624424eb2d4a9209654d7726e3b55862aeb
SHA256dc2d0f011e28f21a657a8f712f1338e17c8914c6445dbe1fcfef0eac1424a496
SHA512bff93df392fe0564d0056530531d1e25c4b46fdc6efc5a4d0a0918a0b3ea17c84592c6ea42e9465b6bf5a9b04f5687552349d2ae478b475249e4bca7aa626b38