Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 16:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kansascityharleydavidson.com
Resource
win10v2004-20240709-en
General
-
Target
http://kansascityharleydavidson.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 5100 msedge.exe 5100 msedge.exe 4128 identity_helper.exe 4128 identity_helper.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe 4188 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3836 5100 msedge.exe 84 PID 5100 wrote to memory of 3836 5100 msedge.exe 84 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3948 5100 msedge.exe 85 PID 5100 wrote to memory of 3352 5100 msedge.exe 86 PID 5100 wrote to memory of 3352 5100 msedge.exe 86 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87 PID 5100 wrote to memory of 1432 5100 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kansascityharleydavidson.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff63d746f8,0x7fff63d74708,0x7fff63d747182⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14218257876836940414,9653475209098817724,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5d240c16b781bde52f33a1b73f4bb19f5
SHA11a89921beeaa5c28bb8916d88de4e2173a60b11d
SHA2568ac28ed42e81139dfbee1c64d6a30209dde86a78813dc8d50243198244486537
SHA5127b8a69c79c4eea9fc7efe3c1e42f7794c4c206a81c7357857c273d349c179211e4b846ab247cf4dff0499937b84a9c1bdeee9e9e790450824a95af86ee297f95
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
33KB
MD50af0240c2394ef8add058ebcc35a5c7b
SHA1cafb87347251408454771af7459d002192698e43
SHA256f353b198bb078b6ccfcf0049b6da99b9a37e28f85caf902676eb8039a4856732
SHA5126c35056d65f86b122ca0e4d63dd1e8574615ce01fae7971cae252bacb26d5f918143cb35a0beb5cc0e688bb8d4d3b5a2f4c64e2ff170bd8009783bbd601087de
-
Filesize
5KB
MD5a4984fd322f7f262e0239991fae45056
SHA118fc0e7b87436ea6f7aaa565673cf9203163c327
SHA25668c3e56acbcfb1a75df8c373dc1ae28f26aecd8b228c0726328637150e342ced
SHA512e91ab6e13eee7025cd4fef42486f56fb92f91b33fee40e1dd370ec998a9552a60901b530a2edc0dd7319bb7d9e8ea22d407e0336423eff3b2296f7ba639f7890
-
Filesize
5KB
MD55817a605807c38d395c54fbe3b991668
SHA1edd4895547b93ba4f8e9e4896621e4f680cd5aa5
SHA25620d89291ac43cfaf93b68e83abbb278ce57ca81e6f346e128cd74bf2d22ee80f
SHA512aa178d7951d9af9cccbae5ee34726e4f7fdb9a195849a0c35dca885df072f6fe762ba7f6d0d4f0b22896a0c46bb05e8ff304dcbbb29a42692153069f083a7222
-
Filesize
9KB
MD56f0917e6b934abe95ed2ac9bc0b9d674
SHA1888c6f247946ac31ff97276ae0bdac651b1550b4
SHA2560682d68bc748f614e7e6fb4f7291367ba73a77507373ee28b2a648119295b6d0
SHA5125d205b84e49a622753d916594e371faf69e65d8e57ab6ff503fba7b91615e3b61baeff5635305c5e0c6e5e62e9e656015ab5f38dc4cda39336b3474f35758591
-
Filesize
9KB
MD5e428bc24525d30b8590146f06fe69d69
SHA13357cfb107546b44620b602eafe82f444e96f491
SHA256fbc308b990066cbcb6a6674e3fc03c50969ab1889627e9283392f5eecc2f2de1
SHA512cb3b37343e1982a06e5e30fa418776ab99ddf30024d38cc34cec7c15711f3af02edefe1b841b15686bcaa0be0ce113112a349948d5bc474d3532010ca0199939
-
Filesize
2KB
MD554157469715e2a2fa07bef51e8283645
SHA1e8223c4e286d6e2bd92ae3c87294645a81650056
SHA2562b63c981e4f43c13c9d15fcafc0871258555860676e3f17871ec95b6688f4bd5
SHA51266fe45e6fe894b2791ce0b66c5ca3a91448455a2735e7c2520265a7ca9c6951154d05aac5a5c81f1d0bd96e7a4f1248d795d0e4fcc6fca11bb0f49426e5d5862
-
Filesize
2KB
MD526847c4c9f33d7e859c012cc0bd6ad85
SHA165d50731d662409ee85992fe976b7c6b4c01c08c
SHA256d4f7c1cc6ea4e629c517bb63f805618ab7fdc78086d6a2d85a987d8457b8fb1f
SHA5127f74a294e2b90f136b34fda5a040da28a0a0be32efaa10327427d655e9ccf1d024a4a4d9ced2be575c273ee6a9264e80adf143f6870c2bb675d851930bb27f43
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5a8d72ac71e9404e658e497f7875a11f4
SHA1983eb5399a7ff749adae14bfb7b50919b6b97ead
SHA256ee2aac15497edbd705627a57beac550a1bf1b3055a5b95aca70fc60c00e56189
SHA51248e59bb9592f0225f78780f2446d1c1d356ea08f217c5a8f4bbbe3a3267efcddacd7fb4892034e0ca357320f6ebc84f2a53e4d2032c2a99c24dc421f7077a865