Analysis
-
max time kernel
255s -
max time network
259s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 21:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://contentful.com
Resource
win10v2004-20240802-en
General
-
Target
http://contentful.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 4608 msedge.exe 4608 msedge.exe 4872 identity_helper.exe 4872 identity_helper.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3288 4608 msedge.exe 83 PID 4608 wrote to memory of 3288 4608 msedge.exe 83 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 3084 4608 msedge.exe 84 PID 4608 wrote to memory of 2300 4608 msedge.exe 85 PID 4608 wrote to memory of 2300 4608 msedge.exe 85 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86 PID 4608 wrote to memory of 4064 4608 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://contentful.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa159846f8,0x7ffa15984708,0x7ffa159847182⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,686642678766860413,12607453025329314925,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
39KB
MD58a25c1e8486660038810996c56b89c8c
SHA1df986afdbf43e31d3f2bd2217b4539bb64e1bc06
SHA2569114ac2a4e8a1ae0ab73b5761d342bdb10011e203e87ccba3cf8e6581c974c3e
SHA51209e768b8fd8adb501748a25dc8a7ab2283b993a470a252acfcc38567f626bf866e7bef371be7aaf9d450be4c6a5784ac9e4b9a0e5b4b8b1eec985c1e3df78916
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5396897fbbdbd89fab1a349f14ecbbd8a
SHA1321d2fb5b6f532f0fde3c0dfff56b6c341211f21
SHA256bb14f210626d164d8d92c80b7399e6fc728c70541204f94a6ef2e251beb00f78
SHA51279374e2dba0b75c2ccdd013720c7e1771196007b277007bda025859ec12ac23e980708f9b13acff8cc8ca21cb6f1e4ca433d11c3d6404da24a76ff9c7fde0972
-
Filesize
1KB
MD58bd75c068493513b505319962ddc3708
SHA134c46874a4eba171136fcbfc785fea578a0252c0
SHA25609961c02cc6a210752053a4c95f36f4ba2d004b172af0d4dc233dc0449e84613
SHA5124da2621115ed3d88450c593a5d426751eb0bc9816cef0cc1c6e9f49b3985f7a4185b5b080c5d14deb1e04b4a0256cc455eaadb65ec814f4854ee08260b7bc6d7
-
Filesize
5KB
MD5e1747875eb0b88d41de7848fffb8963c
SHA1a6a2ae640a926f6e0ae6695f0664749db98209bb
SHA256cb56bcc2a2b5c9956713c81cb33c2a46a667c6b1e86a8ae2ae13b862552f9f54
SHA5126b424ff1b310d94f4dc60beeda88221c431574bbd2ff806ce1902ae0b95529a0265389bf5924801752221c0999e501e03d658b02bf089c59b491826af78a8f2a
-
Filesize
7KB
MD59f128a24870a2817600bf442372df998
SHA11370181e49e106eeaeb039ea55c4386f18571629
SHA25637b460b2adcd56f54452171e3c436d3b4b4d48c012dd594c2eb22a92859bfe1a
SHA5127195738fde26554967f98d41ecb0c402d1f034412b31894492a9a51210ea1b372c28714e439ddfefe1267673249affee1ce0b93fd8300c0ee9315c278b93b0f0
-
Filesize
1KB
MD59a5b8076993b922db83b9698a6e07181
SHA15f11fc9d692d336f897438f59bf906e6419e0fc3
SHA25651542ecff412496b5f1ca0d8b7536c0e8bfb3507b6e39b787e81a01eb23b7cb1
SHA512b4875e258012be35d499d13e473cc928456f137295d2cbac4e174a8a57d41bad0d40c6d630e25ab9b0b37760077ecdc704e8bef559b2a3dc62a9dd2b395ac54e
-
Filesize
1KB
MD51580d3bf5faf699b8795d64f14bfcd3f
SHA1672a357458125610463881f2b3dc1ef0b0085357
SHA256f474f116cd28d874fe756eb01cade2c7ca08d249f1afed17040a9b12f8ee719e
SHA512cc505365ab01446ae47ab4f95eedf9358833778c658a2b2e206a867922522420d7105e2d8b910d50af11d8e03bbf264aa7414ad28c61e2fd3d99a5be3dd28104
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50689924575cc9f1d51b46d9db22b466d
SHA130c1c3c18ebd2d98daf562bb30ec872019966894
SHA256d8e3381dca7104ede31aa2dba7658a42786eb4d105c02df6f6b9f76652bef778
SHA512416ae62e12c80a27b27a17642459968fada7346b1632576ebb4b93d2925f52f78f20a67dacaf0cc07f479493d0607d1318358904f17b14789d872f2bb3967c35
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e