Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 20:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kansas.businessspotlightseries.com
Resource
win10v2004-20240709-en
General
-
Target
http://kansas.businessspotlightseries.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3572 msedge.exe 3572 msedge.exe 968 identity_helper.exe 968 identity_helper.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 4036 3572 msedge.exe 84 PID 3572 wrote to memory of 4036 3572 msedge.exe 84 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 1980 3572 msedge.exe 85 PID 3572 wrote to memory of 3324 3572 msedge.exe 86 PID 3572 wrote to memory of 3324 3572 msedge.exe 86 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87 PID 3572 wrote to memory of 2488 3572 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kansas.businessspotlightseries.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac95846f8,0x7ffac9584708,0x7ffac95847182⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9140626386744840076,15452468806820179983,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5875d048de7263764291031c810b65de0
SHA1b42f81c55b5518a8e6810f43ce76d54dc9c01047
SHA2565bd2fc2392c9bc49274d92e6e553e0119d9629287944d04843b676eb1bc922d3
SHA51229ea8aabb1bf06ba0f38bdec19eb8c9725b28be089e1a642e5b1d0e5369716ec6f2b3d64e5551d20881e3ad5789bc1de4f0c9bcb44697661695759132bfbf95e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5d220555ee72054e8406ffed89c44f92b
SHA1f2f0e8b8f80f009474f6f1002e76cb8ebda4a233
SHA2569f0edaf187472eed4e7fc52070716fd040f544bb1b68abe47d936ca126eec238
SHA512f1a809d27d59b7dd1cb4a38409b0309f15b7d126f0ebb3d43358e2afa57f7f7bc5fac0be2054dc70f4fc590e6f76b2107419a9f3cbca05ee557f2278fb39d55a
-
Filesize
1KB
MD55604c531251683fa43e16d3aa26bb39d
SHA1ef01102a85256b083a101eb36c612713c35ec70a
SHA2567091decd2683f2793335ca20b45adaabf05dcd22072889d4c05847fd6cbb2176
SHA5125fe94e4e2af8f7e22b7cac90505ce859e35658b283642a371a20236e4193ecf0c6005bb069f5ed40a9fa8bcf59ced7feef7794eea48fd3bcaae5075de3e080e9
-
Filesize
1KB
MD51cf30ae4023c0f70014691da60fc304c
SHA102e1d9ab6e4017df3445c599a0e6dc1b8c1b0b71
SHA256354a4ab0b45af41da10920203749d8ab991c5f79f96ae3c624523dc022d304ed
SHA5126ad6b94ab1150c712bb766228394fc22cab3e5573a8e406774b4a3af82202345a949aeef25ef0f8d7b40f2e4fd32dd6fe4755d1ae95e6f0ac61c636c2be912d5
-
Filesize
5KB
MD58a41391511bd6193f0d9906c1d368899
SHA1e274f7bf4f5f41c5ac399f1a28a6dd5e7b6bdf3d
SHA2567ebc3a2f0c773e47fee0eb11ef5b55e545be4f002570f68e20e90d18270e548f
SHA5122e16c3633cc6587a084b7d1217b5a217ff66d3f8e09bbbcffda77add3cf198771487db75c84b99fdbb9bbde9742c873aced6db270a4617d5601a9698d4cdb885
-
Filesize
6KB
MD593822d68107270cd3474b2db220e2406
SHA16049c2fc16c08769c691e4dadb47e4d4f84da6b4
SHA256feeeee6f62c7fbd9a328400f04d5329a0fc6cf03205590bda2db971b63d55dd8
SHA5124b5ffdddf5b1365aeba101c192dd0551ddf5d038efb6242b510c156873ffc32ca0aa6ccb609961731046eb077be8f5b776f46f45723b42b109253f42b3c24538
-
Filesize
540B
MD57af151a2ddb9849f28108efa80ee7c9f
SHA14f673cc184a634919ef2b618d069672c7a2374e4
SHA256ff1cf794d2e433db4a2db13899fe7d7e686aa2ec7085b04847257655f0232c46
SHA5126d42b7cbb4d01de38781405431bdd3bedb0d0cf949bf1d7e9fc27e43e1f172b8b39259cb52ed2924b3b30a30ca0ab98e4b3f8d245ff64e4e59c987d1b58c858c
-
Filesize
540B
MD5028500c285bf3529072dd47cb4982876
SHA169dc141af7d4abe0b9dee01124decd1cb4793023
SHA2568c5f18fb125887c535d3ddaa69e256819fd06b7101bac35cec3a655399ad1649
SHA512ca0376034dadd6dd04678296c9a2274472bcff34ff54e6405e92a48eef77c54a37b3967a23f83360192a9200182a358175d36d41779c65a665fc479477471041
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD57f634950d03445b887d687a9ca2bb3c8
SHA1f74a37af25ce838e8cf3e29bc2399bc706766b55
SHA25655c5de735b2858cf53ddc317452775adf8e1f19bfc25efadf7fca1cf1e009d75
SHA512ef5acaf980d4e52dcc90b3e1120ec8050a355a4323907eab713e050fec398dcb3493c6cf622577e3dc7edb38293ad15f11a4f3186356b85053dcc8cd909ab633