Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://halifaxchamber.com/business-voice/planes-trains-and-automobiles/
Resource
win10v2004-20240802-en
General
-
Target
https://halifaxchamber.com/business-voice/planes-trains-and-automobiles/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 3276 msedge.exe 3276 msedge.exe 3620 identity_helper.exe 3620 identity_helper.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 4948 3276 msedge.exe 83 PID 3276 wrote to memory of 4948 3276 msedge.exe 83 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 3124 3276 msedge.exe 84 PID 3276 wrote to memory of 4372 3276 msedge.exe 85 PID 3276 wrote to memory of 4372 3276 msedge.exe 85 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86 PID 3276 wrote to memory of 2796 3276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://halifaxchamber.com/business-voice/planes-trains-and-automobiles/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff849ee46f8,0x7ff849ee4708,0x7ff849ee47182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,3778796897602565022,7787849259154396600,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5c1f42b721c72d1a3eb53a9cffebad59b
SHA19b9e5bf09b5df9f282a288e2071111f55821eb45
SHA2566d8ee6415c6acb228ee54d9be9077c58ee6ee1d02b7aae87f123d4f62196204c
SHA5121f3ed603564aa14f1be63a0c35b9e8b8d08fe44e65bfb63a6ccc871239fc94d459cef0cdfb6f3be0dff09d581ce728d14a205ab0adacfa836e3c362622b6965d
-
Filesize
1KB
MD5e3f0ed64fe7fb49ce9d41616159976d6
SHA157aafb1c1d5769e5dce9d2b538dbd9c2ddf65907
SHA256d199aa50948a5967f20fe68e0faaa5e32a6e13ca08b76b7eab1e1fb7e95296d3
SHA512744c3ac356a361f6bb1a4d75f7558674673058453f726b03a2c8515e4a7626ae62a801acfe5045f8a3e7fdc294b9ddc62022ceb31aab684949b1f661af0c7a75
-
Filesize
5KB
MD5740929eafb8447a254ae4c8eb95f9327
SHA1f6279d1491822182edd70dac4f7aa99ec0acbd13
SHA25611615cf030462df3e61e0f5e0ab324d7d08e0933c3d8348cf184617d77405aef
SHA512991ca8448d24bc59ccd9ed48b9cfa54a3fcb92af533548a501865ca5d7b665981f66f5eaca03c379aca728cd37e890ad4c360d7dab5fce4f0366b034255ad89a
-
Filesize
7KB
MD533b0683ff8466336086e822c9039fbbf
SHA1e7236dfe921421cdaf9ed14fb59185ba2d0b6c8d
SHA25693d3d172c5abadb188131dbd2d6a975a7e70c5182020229931291871a94b9e45
SHA512b1c61fab7175b86f93b4cb80bd33a11bf7a5dee7c66f169720cee58fc52ab898c6418d90b708e3c9e79d7f8c7a6ddb6e24a4a79a379a909cd0ef2d3cbf371b30
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50d312b3a123034840ea322638de4c3af
SHA14bc1fff1b9912b26aee7e5520630eba409bab970
SHA256680c200d013a7e15386fee25bde587ab4e8ba19fd11d6226d5290fc37ab9d79d
SHA512130a96311430e3f8e8cf0c44720fb6acd28f6f0e83e97b39721015dbc107c5200b1cb39b523f34885fe9d6ffa10d545aacdcbd6dace30e3fafebd58345bd196d