Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 19:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.elevators.com/electrical-and-electronics-engineering-glossary/
Resource
win10v2004-20240802-en
General
-
Target
https://www.elevators.com/electrical-and-electronics-engineering-glossary/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4420 msedge.exe 4420 msedge.exe 4208 identity_helper.exe 4208 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 4572 4420 msedge.exe 86 PID 4420 wrote to memory of 4572 4420 msedge.exe 86 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 1600 4420 msedge.exe 87 PID 4420 wrote to memory of 4012 4420 msedge.exe 88 PID 4420 wrote to memory of 4012 4420 msedge.exe 88 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89 PID 4420 wrote to memory of 2400 4420 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.elevators.com/electrical-and-electronics-engineering-glossary/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd582646f8,0x7ffd58264708,0x7ffd582647182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,492120469477494198,14394892639445381039,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD52be72fb4558d75f03e845a919c8470f8
SHA149b4420f8e5b90e10cac909009c4fee726b7b33a
SHA256280be1dd990783284356b17f7ff67277e9c1e042a72c650629708627c05d5e87
SHA51258c841f20dca04bd49abb1267bf6b13a5a3dd594eb0e1f9c0eaa2539a5ee2156437bfddb88256f53664f00779d1c6f34f84b8dbf90ad55f91794211b4f959c55
-
Filesize
2KB
MD50a3c93fe6d27ae4b1d1301dbc019aec2
SHA17fb96b3b110689434a84dec5dfda79b67a6180a1
SHA256580f3efb33e6e280a752e4c62ae71a093adcbaf75a435c5e582e90778c95c868
SHA51271a2e5fd7b57a05f6242c8a12795607745af26ee8384044172726d645a5715f856a637f29ccd509f5dda6f14dc1148c16bf6f36bb6992279dc29e9725811f59c
-
Filesize
5KB
MD5b7922b08060742b954e9186fb88455e2
SHA15c4142cc62a1a8cb3d5426802261cb2ecc022784
SHA256a016944a3b2c4de4fb910f54d0feb8d5d14c5d56673f21fc4a16d820bec04d19
SHA5129238572b009e72c406af77e9bbf2167930d3d58dd33321a328f971ba6c42b508211061ba10b08ab32174d30cfe57d67f79edccaab6542d7309b0985f2f77052c
-
Filesize
6KB
MD545529dd67d1b5ba81b166b42115bf61d
SHA1723ec700fe26cbab2cedb0b2e264208b55f55545
SHA256d06cf87da67fbbd5b4a9c0ec2c4050bf6510d9a700c99eec6a1a3d6b9bed9cae
SHA512324789d9f6fcf79ea728587ba7bce2628210c9a8f817900edd75694170909e581e55339743c35b6b80cc5079d03fa68202007aa8de99682b3ee72a8442481a67
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD582b299a21ab12174f02c0f9dcf2a62e4
SHA1e3efb6eefdbc13c8e9a570682a3f6562686134f8
SHA256e502f7e9822ed7775a33963003fb982f5bd90bc1833eca8a57287924c0742bc8
SHA512244f64693da78b1fbc0fc05dfcb63ebfc9b48648f07a1c03df0d75eae6bafe67fe6b165b60e84b6e163ea40ad25d8a85e7e5fba87fb5787513f845ed30041639