Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 15:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kansas-city-power-and-light-district.hd-ani.me
Resource
win10v2004-20240709-en
General
-
Target
http://kansas-city-power-and-light-district.hd-ani.me
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 4916 msedge.exe 4916 msedge.exe 4576 identity_helper.exe 4576 identity_helper.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4880 4916 msedge.exe 84 PID 4916 wrote to memory of 4880 4916 msedge.exe 84 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 604 4916 msedge.exe 85 PID 4916 wrote to memory of 1988 4916 msedge.exe 86 PID 4916 wrote to memory of 1988 4916 msedge.exe 86 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87 PID 4916 wrote to memory of 2264 4916 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kansas-city-power-and-light-district.hd-ani.me1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd706846f8,0x7ffd70684708,0x7ffd706847182⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2128544458461569793,6624811429109475974,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50cb33f37efdfe04794cf399a7ad4841e
SHA151c3df12d067ffec3b11c992c6829a382ac72d58
SHA25694b29cb164676605811d635333ecfa812f72435cf15aac0c06fd75ed5f84c410
SHA5125b20aaf03e9db3c7197d52d7d59d3fe1c573b4b435d7cbff18732f771d8474ffe918e3fbedf3924ae77f798c52e50f58cb40fbbdc119ed02d9365d0d91359acd
-
Filesize
1KB
MD50d189d250eba3c90c6ca7637c8db8e4e
SHA19f444d84534fe4d94a77341ed5b1d61ce4960248
SHA2562fc9023e59dfc2cab4ff663f5a58220b0832845e40bf50a53282706dc236e5aa
SHA512bfd1279f57d2e358ab956e17e7935d0521fe1db041d600fc40332550adf5dc731412e7bd3d0c47549e2370d7aa4fbb8a4e3491eb1e5d61fe2b7ef80f0a3efe52
-
Filesize
5KB
MD54b154483e38314be3df4c3944b0f60e2
SHA18a8c1f0338bb84d51f891d59e6f3d05e74798441
SHA256a4a3c3a6e61965e0cd64019da10f36211c4b7376f69d37dd150b6f078340334c
SHA512d2d01870f6a14e3fc5629c3f8b47a04d54b4a43fefe731ac291a9ebedef16e1806c88042ca3dde82e349dedcfa6bd4dfaf71023391c009793fbcdf01742877fd
-
Filesize
6KB
MD5d847980532c8d7dbea027e6e506a25d5
SHA186bcc702ba0b98bf6ef7421fbf8f81815872283a
SHA2563d08871d5626d9c784484836c72d0f8272a31e1134718241046b78032f468e7b
SHA51237c4226ff3e0e187cd291ab1e9f0043bd1093a9a463cdc9308122826d6b65964e8aafbe08ac186887ac8d58789446cd141d59415f5e4dcdd7ce447f2eb2c255d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD578e4a5e5f8e55e605467328132d5b65a
SHA1b56b269d54d9f33e1ef36de79c030d8a54033294
SHA2565e08e1ef0155150c005c5a3b384e85f061211ae1c1addcc6f923b0937aaa81f2
SHA5122c6a793ef40677a9f2fb2b985ae4389a283a726acecd020211ebfc299979a774cf9c58ad6e168b936431c4406d65b5165bd07c3952b7f466be5d3c8a615d8065