Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 10:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://taste-catering.co.uk
Resource
win10v2004-20240508-en
General
-
Target
http://taste-catering.co.uk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5496 msedge.exe 5496 msedge.exe 2036 msedge.exe 2036 msedge.exe 3148 identity_helper.exe 3148 identity_helper.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3424 2036 msedge.exe 81 PID 2036 wrote to memory of 3424 2036 msedge.exe 81 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5312 2036 msedge.exe 82 PID 2036 wrote to memory of 5496 2036 msedge.exe 83 PID 2036 wrote to memory of 5496 2036 msedge.exe 83 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84 PID 2036 wrote to memory of 4988 2036 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://taste-catering.co.uk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa819846f8,0x7ffa81984708,0x7ffa819847182⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10387974416367143225,14016354323411706490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
258B
MD59d0ff69c632b542caffc984abfe0baaf
SHA1b91ea98823f8c00d79a269424a43d2a92b26157d
SHA256043b9609934b4b54f2815ec42b3857acbab8df0786275e47645da9f9bce24ab5
SHA512553df0f24898477837df0694be5fdb0d1014a8b3bd9016dad4fa4018cfa1871fea3a6cbd946c8abfe1208e918a7dc52e911f242cc8739899be09291848a7dd06
-
Filesize
6KB
MD5c09274a8f402ccf5f1604074aa851128
SHA16472ee11e3635177039e7f2202294260c6b1b5a5
SHA256c2a5e04661545a2b930cf31f2e608151bbfd0e95f7bd1d00e29a2a9bbf4a1664
SHA51286c86746c0ec5326167a5f80fd09601f2976f6dcdb847fd85440cea6124d4466d4d13f34806aea74cba44271e2e91cc3ec3af615720fffbc74c8f115bb8d8951
-
Filesize
5KB
MD599559be26b089f75f8055f33c87d7a49
SHA19ce374e3da5b6f5613c9efc5e7b19d653f7a45ee
SHA256e1ac8939f8cbd9c8783e15b2e612d8ac4c08e6a5dc1128bb1dcff62c31477187
SHA5124d6042550f707f5c0fdc1ed42e7051ce14b28e37c7a4682068fbb0299881e0e94b143ea34e435203d638ff3445f775ace404d279b0a750b8bd2daa50f97a9613
-
Filesize
6KB
MD5b255258c2852bb517d61e5aa1da3b882
SHA16c0bed2f6785031f15b8b52a6b4a7d56d7075228
SHA2564e589f05a2f3c49f0f5334faccf2b46b3db70f6a1827ef3de35bdb9cd83f8703
SHA512f3dc818c2f89fc1e22754ab7d724ac78e53867c8186b2142314eb1fa2d86ca2feaf5b73cbb96c021688a5f8cf4fcf9b45f39d08533367da64dd1338cd5d50748
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50312ee7ef72f028bd02b1f01e2aeb19b
SHA1a2b3c80c8a77e305906962f21306024170e914c8
SHA256acb5735912ba5e3d9a1c59bde1bf3caed8f17cb46f7e948052115544592e190f
SHA5120d666b52d03cac986fbea12e58aa6aab818b446c9a391087f02c6bb11e4d898625f3955a2590eb44511b39cc548ddc9bfef5b5c437ebb293bf952a86b0fdcd46