Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 17:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.lucentinnovation.com/
Resource
win10v2004-20240802-en
General
-
Target
https://www.lucentinnovation.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 768 msedge.exe 768 msedge.exe 4920 msedge.exe 4920 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4944 4920 msedge.exe 84 PID 4920 wrote to memory of 4944 4920 msedge.exe 84 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 3132 4920 msedge.exe 85 PID 4920 wrote to memory of 768 4920 msedge.exe 86 PID 4920 wrote to memory of 768 4920 msedge.exe 86 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87 PID 4920 wrote to memory of 712 4920 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.lucentinnovation.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe15b346f8,0x7ffe15b34708,0x7ffe15b347182⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,3381710450637676446,10914402488078880306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize600B
MD5a761031c079dc573a04d741d209ef1e0
SHA1112031ebf123c00de297f9d717f718e999d95e62
SHA256e1f023b5c0d426f44c1d23fabf2c584cc90fed055974a690f09575d8f6d7b998
SHA512509b3d5b2d361eeb1e3730b28f15db41b9dde090da709e614fb31101b3f43050b50eb30240d757d5df24815f1b08ff7b8f293e2e462ea6e5088a0e6cc63b91ec
-
Filesize
1KB
MD519b72b214201fca82c8fa29f533a85ec
SHA14d30257c96819a0f18781a4f7f0d7f8ae826b14b
SHA25672ead3bd9c997add23524479164caea7a5449f76aa2199d81f11b01753d045e8
SHA512bd666ba801cd1f7564194317b585d100ef92ac001f194c3885b81e22635b6f0348b519260808571bc9edc775909729bcc9be4807e85a46d00ef800ec4e979f07
-
Filesize
5KB
MD5af96308858502fd6884c93db69b258ef
SHA15761b9e0f01ac59449f22f565177c5ba349a4a75
SHA256309ce66f1e6432d6851ff5de5288d99c92d02b224a4557d469d854ac7df53dde
SHA5129ac8924188ad6e844c3bcbc599716a7e1de43d95a4686bd85348da7bfc33ef018bd7403dadf40971e0efbaf70172936b3379be9c6e7513ddb7ff636901bb7b8d
-
Filesize
7KB
MD5e12d707adf7578088955f581a824f325
SHA1503a0ea26a7116e68fa8782371c97fc3acfa58ac
SHA2560d296ca8a91b211fbb691ad988d075cd3912d9c8548e30e7d188c2d14b7e0e45
SHA5128919c978e11106c478190bb8c02eaad3448014184e839a1a3636abe7c58478ab27e0131588c7d5c36bf3c272edfe77f2adcb866da5487a2ea94741d2b54de93b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c5eecee959a8182ec23405a346322ccd
SHA1d71b43033204e0150837330044c07a9679a3b6b1
SHA256bc2c17ce4ae515cf73beb93d30494526d6a44e6bbfd4acd3ed9eb85821b2e612
SHA512f6ef409ed6b3a96d8612382d606a97055a5b49d0499deb28a06760a3473766be333adcad4514e2b6da06b30f7b00a36eb891e86a2455c2c41d77f9617439e00c