Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-09-2024 06:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cpm.wxadserve.xyz
Resource
win11-20240802-en
General
-
Target
http://cpm.wxadserve.xyz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2288 msedge.exe 2288 msedge.exe 1320 msedge.exe 1320 msedge.exe 1564 identity_helper.exe 1564 identity_helper.exe 4976 msedge.exe 4976 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1764 1320 msedge.exe 79 PID 1320 wrote to memory of 1764 1320 msedge.exe 79 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 3644 1320 msedge.exe 80 PID 1320 wrote to memory of 2288 1320 msedge.exe 81 PID 1320 wrote to memory of 2288 1320 msedge.exe 81 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82 PID 1320 wrote to memory of 388 1320 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://cpm.wxadserve.xyz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff956e73cb8,0x7ff956e73cc8,0x7ff956e73cd82⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,1481692991573431023,1335970843160983894,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
Filesize
5KB
MD5f3947ec53242389b1d630948d834c5ae
SHA1618ad66d7aae3cd12d9ddc58542f95bb0dca41a7
SHA256fe8a6ca2460a2f61c342a0403d492bd90a8c855ad7243d07fc787ca11377e7b0
SHA512752e9a90e7d9c4287ce0b2c6ebd3307def3db6afc43836326f8fee5c8e139549c1b1265bec4f30cf8abc6507e3169c3adaccd51ec3d7e4310568b250a17dc64c
-
Filesize
5KB
MD5d00236ad2c206d68b3d469686719e371
SHA1ea02db8244275b56c43af80c80505c0e6b523509
SHA25632e959a86b247f5b554f95694e3d668a081d8b8ceac9799e0fedb7977b3c6be5
SHA5120f7368aca95de0cb7cacbe16ce16bd121434d52bff228fabe3f47cc8c667320e137b7db5b04cdc4350a6000c2ebbeb03a07098d6304931f5109ccf074c9b1d39
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57cf28ec1b7f7b96889e27192a53c66fc
SHA16a2441046b9900ae13cbe8453dbc1600a926bd32
SHA2561044ffb58df5f9e8050cab17b21becb4ea7e2a8231e9f9a83046b2df0d1e0e0a
SHA51260fcc62620dae0a1f7e7753cf1577a7e05ee132155661e65b6d0fa132f352cffcf5e86d46f477a621aed9b5d08705e4f3e332637e41dd0f4270acdf33499ed7d