Analysis
-
max time kernel
563s -
max time network
484s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 14:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/how-cloudtrail-works.html
Resource
win10v2004-20240709-en
General
-
Target
https://docs.aws.amazon.com/awscloudtrail/latest/userguide/how-cloudtrail-works.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 836 msedge.exe 836 msedge.exe 4780 msedge.exe 4780 msedge.exe 3032 identity_helper.exe 3032 identity_helper.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe 4780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 1084 4780 msedge.exe 83 PID 4780 wrote to memory of 1084 4780 msedge.exe 83 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 3844 4780 msedge.exe 84 PID 4780 wrote to memory of 836 4780 msedge.exe 85 PID 4780 wrote to memory of 836 4780 msedge.exe 85 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86 PID 4780 wrote to memory of 1252 4780 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.aws.amazon.com/awscloudtrail/latest/userguide/how-cloudtrail-works.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80d9246f8,0x7ff80d924708,0x7ff80d9247182⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10194192884051479887,414962962005255592,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD505aef88dda0a1b1faf35314ed05707a3
SHA1bb1898f2b7b0e7d8ef6e0a06856576c305e9f238
SHA25666fa8cbfbe3fa9bd772f41417a333dc6e97e94ac9c5abe2767481c9bcc0a4a3c
SHA5123ef23aa26a2fc4cd5edcba04fa440d5fd5bb64c24747d601b1d62c3b88447b576378a1c5c43ccab6b18ded147d35b8e2c29c2d9e28e0728e3c870443c81c0241
-
Filesize
1KB
MD58e5c93fb1e5028b08234de50a4cd7be7
SHA18d80d86eff177f814e8fb033e9d27583f7b77b7b
SHA256b284b81aa56ff81eb6ec857731a1a7693b17d8681b50b1a0a732b646feeced62
SHA512a64e24bbf71b0e0ee0416ca3d0a55936f4464d61208cd46af00c83a870213adf5ad978ec5e08f360a5588d4fcb0ef00b3a970e9fec53425a03d606489f7b5938
-
Filesize
6KB
MD500ed21ec370465382045f265d39b6fe2
SHA1dd2da9142a273b5498f41d7670035cbb149faa6a
SHA256dff21864305030076531bee9bdebc27d33e56e233405bd53541cc5bc112b34db
SHA5126c94d32fbaf77ff2b126d2caf529407405539368224b2f7327655f9e1a74cda12de52d2345c7b5c0eea6fbc3a0428e1f2d2c9a369089f94b5d9a232d33ffea65
-
Filesize
6KB
MD5f2622eebe8b4dfc3009009d3926a6b6f
SHA13f7df4e8c44a0981eb1ad574775a65621d781c00
SHA2561c61171888364803fc528394aa1cee43e7f373472fb0af2a937e8701be80d9fb
SHA512dad0cf329331faa5fe01624060cfafe5a8af4b9fbe1cf86ee403ed6713a4ef6f069e1eadbc687df0e79eb7a1a670b6f0a26b7fe7594a97c5044680d3582268b5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD596f14cccc46b01145ef66b0785f583bf
SHA143b0b40a60e9fb0c20a599ef2f5cf89ecda2a433
SHA25613ba6bca73e97a8aa518aa1cda0b89bcdb485ac86a5266070a536f6170a2b535
SHA512d9dcf5e3ba1ce17ae1a65a976f736049d6517cb5b229ec2153904c0c2dedb7d6dce0df7c632c6e2ec24197a57570686d5e5629d704860cb5bf6fef9e33487e6f