Analysis
-
max time kernel
62s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 20:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://coriolisconsultingcorp-my.sharepoint.com/:b:/g/personal/nolenick_coriolis_ca/ETxgGSEoi_pNtPIyFdorlAABvUzY1Z2LDa59PIoWg173EA?e=4%3aCMBfUx&at=9
Resource
win10v2004-20240802-en
General
-
Target
https://coriolisconsultingcorp-my.sharepoint.com/:b:/g/personal/nolenick_coriolis_ca/ETxgGSEoi_pNtPIyFdorlAABvUzY1Z2LDa59PIoWg173EA?e=4%3aCMBfUx&at=9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 3268 msedge.exe 3268 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 184 3268 msedge.exe 83 PID 3268 wrote to memory of 184 3268 msedge.exe 83 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2836 3268 msedge.exe 84 PID 3268 wrote to memory of 2232 3268 msedge.exe 85 PID 3268 wrote to memory of 2232 3268 msedge.exe 85 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86 PID 3268 wrote to memory of 2604 3268 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://coriolisconsultingcorp-my.sharepoint.com/:b:/g/personal/nolenick_coriolis_ca/ETxgGSEoi_pNtPIyFdorlAABvUzY1Z2LDa59PIoWg173EA?e=4%3aCMBfUx&at=91⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,15129617296544477216,7817185678520202557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5c295035fc0c0cdfd9ddde27590af1b2a
SHA128138dfc4c508683b4d7e3a18ca1f549549bfeb8
SHA256579a496dca329e27737fe4a5c9ee07e9cdb53039d4d8b1604daa898614bfa5e4
SHA512e4b4451b30e49f25edb803a176f9256fefc4dd66950b2ac537bc1ac5fc0ca47670e6d5d9569aec650561b091259bc82e8cb324ee3d6261b3b42a4c1c2f807a25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5917eb5dda5b870b7a532e9b35fa7db7e
SHA1ddb22b85cfcbdb02686b90434dbb8c5488c09e57
SHA256599eb023cb15dcb694976bc897cb48487692679be58283064aea8a0980bdcf21
SHA512dc07267fda4213af5c3b6811dbadda8f34162233bd3df870f57c7e33b493adf5ceca16731bc3f12601f835a7f7254a9128739a7c70068039f35d03a8a03713a0
-
Filesize
5KB
MD5564ea1f5d9ba0be6b536574bc30c33aa
SHA11f30e1989cda3919e41fcb31029262cf7b79997b
SHA2562e63617f76a6329438523b540057ce6eeab64cdcc25dbf0540c1052294a1384b
SHA5124b372dc6d5548022ae40125330e44b7fa572042311946f5796c750ef9b5be85788dfc6d6430ebf954dbf4eb4c43b4eae16de80c918a23fa3e7cf75b0cfa5b995
-
Filesize
6KB
MD5685b768473b1b056c9d58c97a7170946
SHA18ea5760d4018f36bad27e688c2f6da11aec6e372
SHA256325eb8dc61a7ee3201b379c06edce305e78cbc7c7f5a2ab44f7b7055372b2d37
SHA51222f558e9fe604cc28a8f8094ebb49a415c1ef64a7dcdaff2a1f9735dcf73791045155988941efb407e202627cf6c76d037cb9db185a69197c1f088390c086fe8
-
Filesize
6KB
MD59a911c3c3c9aad21068e4ffad6162efa
SHA114b01b860f4f19cc7602427db6708db862b2d131
SHA2564c327895be5e9b3bb5ad3d5221dd8b64888e748f95624b7b8804f214f9afc945
SHA5128cd810f75b0a0d21709c27d38b7a868cf09e61435ab8ad4f0b12ada60b6da0b4f52c9571e3a6c61962853c0840d0a5cbd7320485f2b76d92172cd5766ba3faef
-
Filesize
371B
MD5d3959df33fcb2662bd3c7a604a471e3b
SHA1ba6ead383d7a3348178b05c383194adfdb49e4eb
SHA2568461aefb77ac5413b8ed4e5633861b967f50160d1a65098df07255673c2841ec
SHA512c2bd40c842688919ff97df976b3527f12f91001cd75078405bebe59799b99bb3afa06325c4b510dd7cfff7e685eb47579d881a8e6a0a48a2f5c6fc6f2623e74c
-
Filesize
371B
MD524367e9b25ad122bbfb2b58da1b5ce75
SHA14b0be7b7381a5637ed7bcd3246f8a735f3de4f81
SHA256cd76940982d957828cb680dbeb76c35b87e012592d6994abbab1478502ca2c9c
SHA512eee9ff87f310250683f9292d144f18edb62f39b76930fabbb515af2580ed511048e0df4f200ddd1356d055b6c3505c2fd68a95c913e4918dafeb23856402148d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a07ec6846e31ef85d28399f8394ffbd3
SHA102857b21469410bc1c8dfb8a866895c636319a1f
SHA25687053868c9643c2612efc1c6e5f2b66fa60736c8ad97ae658143103b46cbb0c8
SHA512e5aa9ef45e9040a28b833d3909a1d14090d2a04866b64b183d3807981710d18f37d777108c2cc5d4f626fb07c717b7d2a34dbfba0687ebb22c5c20a91dbbacfe
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84