Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 18:17
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://kedaiweb.co/colors-pick.html#[email protected]
Resource
win10v2004-20240802-en
General
-
Target
https://kedaiweb.co/colors-pick.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 2320 msedge.exe 2320 msedge.exe 3532 identity_helper.exe 3532 identity_helper.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2424 2320 msedge.exe 83 PID 2320 wrote to memory of 2424 2320 msedge.exe 83 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1756 2320 msedge.exe 84 PID 2320 wrote to memory of 1796 2320 msedge.exe 85 PID 2320 wrote to memory of 1796 2320 msedge.exe 85 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86 PID 2320 wrote to memory of 1316 2320 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://kedaiweb.co/colors-pick.html#[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dba846f8,0x7ff9dba84708,0x7ff9dba847182⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,16969312206002268657,651042904572671432,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD561d7ea50a4c1c719e665e23cb97674b4
SHA18e428b99844b52ccaf058061e34c7da20f42ee8f
SHA2562f311b63c807696142a437868dd7303dcca905450e076f7c4ebecd1dd15284bf
SHA5123a5fee2d5c5f3892ef3f2446f171f1aa0b6812c3057adcd92fc8c78cee1e6f177aa3a0b4bf949e901e2979e408abd68902d2c8d791bbafd079d7955b8b13561d
-
Filesize
1KB
MD580727841a9cf79580e147f416fc56360
SHA1e9d20a12c3190e35d19abf63b1976f1d5a6058cc
SHA25694470d85b14646b1aeb3aa3c4d16f90a3a7f4508ff85d1a6ba2859d87cdc2c6f
SHA512df25f529edb1a05edd1c613054ea5f71a0122cc856e68e6e6d4de29296f5501a1481802a1ea8c5df4751ba16b17088bd9bff77532fa4a9631621ea802c7bf1f1
-
Filesize
5KB
MD5585fd08bd8ae85d287d4c189cf748462
SHA10e59d998ef027e8470af4462b36ddef891d09cca
SHA2565dbbe1ad7f9346a6d32fb70a43dd058887475ea69deab8793a03388a4baa4c67
SHA51273a228e143dc117d105cd0a44f89fa59a6d860fa045912a12f6875d4cbdd822e64f8fd92c8789735199d7e67c98d61c5f2462ec179e13cea23963ec9e72cc832
-
Filesize
6KB
MD5b0e3de7b72f7ddc5a869f51d84f92e58
SHA14114a0aff43fb38aeb6b869007df2fed647c59b9
SHA2563782220be594210658105aecaad7e158747360131b7cc76ac2dbca9418a41e46
SHA51218210a7d5d4e9af41bafddcbc10447d9a4c6bb3c3a51fd8ae5d9f79f5e868d90afeff8aa6a1e549364d86e6da96dc99fe97d34f96d26cd7750f56a26465dc8bd
-
Filesize
6KB
MD5c818148b6174572d339e5bfd16d91307
SHA1b40c0a1cddc61d3a78b99253147913d391452fe2
SHA25644b356f77cccf0ec5b769edce59782db2da88ee9a3575cdb70584e6460739025
SHA5123d762579f9711bea830d62e4fe479fcf1c42c444bca7225a302dd9da140171d7a0369a2a4adf5ae9b00667990e7398b01c7b412899d544702e57605d51fb67d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ab045b89be5167f8a734df343b49794b
SHA192d56a188e2c529e21400f81eba3a857ac809951
SHA2563b01e4f22a3851b3c2aff49a7e356c89fe5cdc4c8457f0f36614c94cabd47177
SHA5123c20b075ffd3f32e9db613d021e033b314eb197b33be72933b504bf48fbe0644ef6de4d74e7f635008a0a61073987bba0fc62cdf6c5eef38ffa598e36da12023