Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 22:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mouser.ca/ProductDetail/Amphenol-CONEC/43-00161?qs=k4kUdCzLgS6%2Fx6rOHcz2zg%3D%3D
Resource
win10v2004-20240709-en
General
-
Target
https://www.mouser.ca/ProductDetail/Amphenol-CONEC/43-00161?qs=k4kUdCzLgS6%2Fx6rOHcz2zg%3D%3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3419463127-3903270268-2580331543-1000\{4B06F10E-AB64-4FE6-AF26-7373523F4A25} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 3968 msedge.exe 3968 msedge.exe 472 msedge.exe 472 msedge.exe 5112 identity_helper.exe 5112 identity_helper.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 3464 3968 msedge.exe 86 PID 3968 wrote to memory of 3464 3968 msedge.exe 86 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2596 3968 msedge.exe 87 PID 3968 wrote to memory of 2468 3968 msedge.exe 88 PID 3968 wrote to memory of 2468 3968 msedge.exe 88 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89 PID 3968 wrote to memory of 1480 3968 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mouser.ca/ProductDetail/Amphenol-CONEC/43-00161?qs=k4kUdCzLgS6%2Fx6rOHcz2zg%3D%3D1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cae246f8,0x7ff9cae24708,0x7ff9cae247182⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14708551584513651274,8937248027873241322,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD52891c46a7c0e715e693907b8cd8a4a68
SHA10c6b8230aa83fa1cedd7b2befe02ca1a84722725
SHA256450d292d3cdeee6e0abae60d03e35400fcc50eea654f5d3a89040d131c838c2f
SHA512f690da0093fd00edf6b3fdf1b369de34e9649466a590a5486fe81588cc5e9ff267016fea4278a422dcf6887851492534636ae68678621fa16493c14234de178e
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5aeb7d0bf468d42f350c9e73e6f0e5056
SHA19cca411c9c7a7b24feffed0cccf74319f118b07d
SHA2569c577aed987efdc5f402cae043e110bf370dc7b99d4ed037b973fcce7d87a5f4
SHA51210ee22e1b93dda8b33a7f0f98ac99eda8a124c2474e6c8ba84cdaa7afbf2b042d7beda6d9c043c2d8e9913f03c3ea0a37421a7e3d02841be3e20be3bbe84ad21
-
Filesize
1KB
MD588a670435c5a1e05e0d38ed57e7ee29b
SHA1ec2fb16119a73a9a40fb7d023a2a734837ea4f61
SHA256702bd8a8200cd38d09f9dbc3817b822010c21cd6231fd2f68cab029dbd2f2704
SHA512cacdd2540cb9d14eea87435b7bb3406cc6531033d737d7dcb31ce49055c2c94142f5f8a5eb4fc63d4d465a41799361db5e0332837128becc3ef3fbd7b1dc18bf
-
Filesize
5KB
MD596fcca881d6ee7b5de430722ca43faaa
SHA126fb1c9e84324185543fb9d39fa32c38e610005f
SHA2564fcbd2a0bf754b85bc59beae99397b4f8b18b03e0b9dce2392e3974bcd8adde5
SHA512e0c16f00a3ef5e36edad29272ca668b1c5392a157ec0fae89cc9ab9fd54e2c00d6021576b44283a63ccd92d154644aa1c56d701b3bc18ec226a6f96cebe4e629
-
Filesize
6KB
MD55cdff2c420188a5119e8866fff273f69
SHA17f0f83e5cb16761388aa30acd2400d1d6a27a005
SHA256b46f96c89ee8987bc4320a1bf2d0fee281fbd18a4dc04c9a7f083dae22769d44
SHA512fac964eab45cf1e08ab7d8e9aca29fb23645128b87eeed0e8c24416653042c4d8cc98a06b7266102caf27c0eb5939983ad50812d2ff1e6ee6249779890a69214
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389