Analysis
-
max time kernel
192s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 00:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://content.redpitaya.com/blog?utm_source=google&utm_medium=cpc&utm_campaign=asset&utm_term=sitelink&utm_term=adc&utm_campaign=Products_USA+(S)&utm_source=adwords&utm_medium=ppc&hsa_acc=1801228039&hsa_cam=17373487364&hsa_grp=150972804133&hsa_ad=696071493792&hsa_src=g&hsa_tgt=kwd-21702586&hsa_kw=adc&hsa_mt=e&hsa_net=adwords&hsa_ver=3&gad_source=1&gbraid=0AAAAACWeMwIpGRGSykooC5oOjrGOlHJ57&gclid=EAIaIQobChMIso6dk4_fhwMVGDQIBR01IDHzEAAYASACEgJ22_D_BwE
Resource
win10v2004-20240802-en
General
-
Target
https://content.redpitaya.com/blog?utm_source=google&utm_medium=cpc&utm_campaign=asset&utm_term=sitelink&utm_term=adc&utm_campaign=Products_USA+(S)&utm_source=adwords&utm_medium=ppc&hsa_acc=1801228039&hsa_cam=17373487364&hsa_grp=150972804133&hsa_ad=696071493792&hsa_src=g&hsa_tgt=kwd-21702586&hsa_kw=adc&hsa_mt=e&hsa_net=adwords&hsa_ver=3&gad_source=1&gbraid=0AAAAACWeMwIpGRGSykooC5oOjrGOlHJ57&gclid=EAIaIQobChMIso6dk4_fhwMVGDQIBR01IDHzEAAYASACEgJ22_D_BwE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 552 msedge.exe 552 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 3744 552 msedge.exe 83 PID 552 wrote to memory of 3744 552 msedge.exe 83 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 1336 552 msedge.exe 84 PID 552 wrote to memory of 5044 552 msedge.exe 85 PID 552 wrote to memory of 5044 552 msedge.exe 85 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86 PID 552 wrote to memory of 4372 552 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://content.redpitaya.com/blog?utm_source=google&utm_medium=cpc&utm_campaign=asset&utm_term=sitelink&utm_term=adc&utm_campaign=Products_USA+(S)&utm_source=adwords&utm_medium=ppc&hsa_acc=1801228039&hsa_cam=17373487364&hsa_grp=150972804133&hsa_ad=696071493792&hsa_src=g&hsa_tgt=kwd-21702586&hsa_kw=adc&hsa_mt=e&hsa_net=adwords&hsa_ver=3&gad_source=1&gbraid=0AAAAACWeMwIpGRGSykooC5oOjrGOlHJ57&gclid=EAIaIQobChMIso6dk4_fhwMVGDQIBR01IDHzEAAYASACEgJ22_D_BwE1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc0a246f8,0x7ffcc0a24708,0x7ffcc0a247182⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15840118671880177464,2541598684396195503,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize936B
MD56622501b9dcaaa6e436fd1d39ecd99de
SHA16f83fbdd1a54c3ed0fe233ba74543a9aff7c33d7
SHA25628f877a5aef025e40873d76b70962ed9825abf529f35c637ac0eb89d93011f38
SHA51200e87ccee25652023751788b309bcc90d1a208aca716fc98c76e29a9945ea060a023fb9b882c8f73c36d244176f6cb61097ca10311c8cef36afad06c48487814
-
Filesize
2KB
MD578629cfab282e2447d097d199624a62d
SHA11ca99d20ec67d2ee1e2cb5093871aad5aca9fa06
SHA25648d4f9231cd580d0e3e82d899d63c620efcfeda89cbf6e0a1df514ba960ffe79
SHA51239fb17ecd82931537bf7b1c4d7867cfcb04604796bb28e88d44726e404a140a0a52298a7a7e51943bfd5925478154126ebe8449dedaa7acb485d3542fd66c6cd
-
Filesize
6KB
MD5e528e419b6b2ad8ff5ed65c7eb1eb647
SHA11ef807ba5dd3809d2d0fc554a78df5814a8af94b
SHA256753a6da32e236a2f40d92a459b58592208a8e78999d31e3386ea2f8d24ff11a3
SHA512e169c68dd482855ba2800a844ffd94f0ab8589198f3af5f2018d5f7731e25dc075d70619642c3867a3748ee932ff95bb9798126b85594b14cbbe176fea0e402a
-
Filesize
8KB
MD5c19a1f8d9b3c3d7078546bcb240868ea
SHA13111c96d3a6e6919a636659b38ac980f71cd1b21
SHA256625f336ea8a84b2cf5b855940ecf0605ed71ffaab51fa169a0bc8cd64817f578
SHA512b2b282ce48f4af94c92add573f9fdf5eec348d8c56c9738801409ab81cc784b7e7cb4272915a32f7699eb58d42719985d7aa9d80c49797add559f166ed1e119a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df6f0b3fd3ddf2881929b72da0e16148
SHA14019205e5aecc6965ab18b5748baa1ef963892b4
SHA256898aa4a9cd635ff601b329ca9019d2a969efbab2b1d9b09d3a66d33d3f07dc29
SHA512c9b4b37cc6911eb6d6de246427e3fcbea11e29fc7cfad07456be035871f9a0d3adf2eba2bc503b334823d4859db74a7bf667086dfa14673aecc661226ceb412c