Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 06:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://corretto.aws/downloads/latest/amazon-corretto-8-x64-windows-jre.zip/
Resource
win10v2004-20240611-en
General
-
Target
https://corretto.aws/downloads/latest/amazon-corretto-8-x64-windows-jre.zip/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 4484 msedge.exe 4484 msedge.exe 916 identity_helper.exe 916 identity_helper.exe 4080 msedge.exe 4080 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4652 4484 msedge.exe 82 PID 4484 wrote to memory of 4652 4484 msedge.exe 82 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 612 4484 msedge.exe 83 PID 4484 wrote to memory of 3936 4484 msedge.exe 84 PID 4484 wrote to memory of 3936 4484 msedge.exe 84 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85 PID 4484 wrote to memory of 884 4484 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://corretto.aws/downloads/latest/amazon-corretto-8-x64-windows-jre.zip/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff959b246f8,0x7ff959b24708,0x7ff959b247182⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,14514681050181425422,15368170747083400345,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
5KB
MD54877d3aae2fb571c2c757547d316ad84
SHA1dbcb98b3e83e390bcead5e50734cce30824d82a1
SHA2561cb89f821afa79ab73cdd4bd3ffc424bf9b84be617c379a3e7ad7450400ceb71
SHA5121087029e211514a9e3f22d5ee8c2b9b801ee1025c0b8e422db3a9b535eed1f130822138870b5263924729fa9d9e8423356c42f416cdf9348c80015a20a1e7f70
-
Filesize
6KB
MD59a3f214a6ec455582b993a894a8b775f
SHA12366d7704c0ec8af3af154b15dedde33ff0791d1
SHA256ebaf8d969db26e9b43e933b5b76c4cce722b74693673cfd9a58ababfde103a98
SHA51228c8bdbb3574b935896a196c09dfb5c53be7cdd32b3175ec7827e2896153598115eecb6c291021df52c89f35ec9ec9d5618854541acd6c58220ddf515eceb70c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD528ee5f4092515c1de919b2f85172e5ca
SHA172f92523f9575ed9155ac959bacd97af8f50cb05
SHA2563d0c74d0a589d1d650528cc6a215773ef84ebde0d55dd0f99282be6cf1916dfe
SHA5123d042bc864910d8da97d4a65d19eaf2bb573cd3129ad0e6b85c61cc639a7b6ea85ca4d2e344039318ec30d23437c0cf76a18114f9240f4b0e61657ef4d400aae
-
Filesize
11KB
MD59cf4cd789b66ce9f77b24be23a1933b7
SHA17c6ca6410987d6328428c54598cce5c07576db7c
SHA25650372af6dbd7f174824e07f58165d77dc889c5be23a6235c65ea16b0aa8a2ecd
SHA51234d10785ddc1e546b84c6d6e2da2e26e725cefa5d34c80abe8ab65bdf148b03936d1a002e6d73ad2bd4b7efe90f6ba5bb6632491654c1b8d79ea2bd6429a5d8b
-
Filesize
46.2MB
MD59a309b8248b8f76ab3e28dec9f82ed25
SHA1f66e42088b2a13a4c4f8276953263df86641e15c
SHA2569a3bb82430026cecc900ef1bf0cb7068c07e4079a7e51f9627ef114d2bbd5c44
SHA51215a5599a4f47b997cf76568f3d7744fea3e1b537c03ed5f983ce9d587d2f1f6bea20e54caa26bb87106821f5091b7dee9d8cc7078eadb0cd05b67845bf7d8e8c