Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/10/2024, 11:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://theambientgroup.co.uk
Resource
win11-20240802-en
General
-
Target
http://theambientgroup.co.uk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1496 msedge.exe 1496 msedge.exe 4108 identity_helper.exe 4108 identity_helper.exe 3504 msedge.exe 3504 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4316 1496 msedge.exe 78 PID 1496 wrote to memory of 4316 1496 msedge.exe 78 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 4992 1496 msedge.exe 79 PID 1496 wrote to memory of 1952 1496 msedge.exe 80 PID 1496 wrote to memory of 1952 1496 msedge.exe 80 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81 PID 1496 wrote to memory of 4888 1496 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://theambientgroup.co.uk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc4c6b3cb8,0x7ffc4c6b3cc8,0x7ffc4c6b3cd82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,5789125266855924532,9221279194340254552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d30a5618854b9da7bcfc03aeb0a594c4
SHA17f37105d7e5b1ecb270726915956c2271116eab7
SHA2563494c446aa3cb038f1d920b26910b7fe1f4286db78cb3f203ad02cb93889c1a8
SHA512efd488fcd1729017a596ddd2950bff07d5a11140cba56ff8e0c62ef62827b35c22857bc4f5f5ea11ccc2e1394c0b3ee8651df62a25e66710f320e7a2cf4d1a77
-
Filesize
152B
MD503a56f81ee69dd9727832df26709a1c9
SHA1ab6754cc9ebd922ef3c37b7e84ff20e250cfde3b
SHA25665d97e83b315d9140f3922b278d08352809f955e2a714fedfaea6283a5300e53
SHA512e9915f11e74c1bcf7f80d1bcdc8175df820af30f223a17c0fe11b6808e5a400550dcbe59b64346b7741c7c77735abefaf2c988753e11d086000522a05a0f7781
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5bf180e746422c943e393ca90b14ff9d6
SHA166f25c4e12b5bbcac3244efa183f07c1ea099254
SHA2565e67318cca2636bd116d808316c3ce9eec1d7f4cf2266480be12863a9a1fec33
SHA5125575a8eb8642269bbf5dffb9835ab19b73cf3e7846b45dfdaa6a64e192eda2680c71c4421765e44d5e780d73d2e31206fb73f90f76436c19d45cdaedeafae282
-
Filesize
1KB
MD518fff6af3f5bf1353d859c2465695107
SHA133ffeb052b43c4d22c6bc93a2aba9fe354e305a0
SHA25665744796d9e38cae0d25a86618ccf4c7d8897e16dbd4b10716b03d8ee0b10aba
SHA512e53dfe112ae5d8b1656d2887324127c9c02b854706f121654e0cb4652d3af97b3a5fec6c3c0148fd1f2f16bd8c6fc172c0bdaf3b151f025156fea0490a88f538
-
Filesize
6KB
MD520565d9b4f531ef36bf21d2cae0d542e
SHA1af3c51810d0e63f1de5e6123112a33a2ae2e6ca3
SHA25670923326c5c6c504531acb4426b0f2167c139d2a0d1619a18e6bf54d8011275f
SHA5126a52eba433305d8ef4092e7d8a558731b987ddbf014ec6003c3a8ddaf27122573c40984c890c0dd8aabb028a869b5c927c25e04655f2338a34eccbf644040263
-
Filesize
5KB
MD58d8dbb1e36a01ca5fbd43d9f10665951
SHA1329ab4065680027c49e2a56cb9dad659fb703e33
SHA256dddf2bb748f7aef29d003198e2e32e54e0815344a4b97df4e1a2904bfea3882b
SHA51258382197fac60758f9f1465f3d3b3ae3dd6acc0b2a3d9bb74453c67bd01acfaf0f965a03cccfee45e5d073ddec4cd9eb6163775e0d9dc1c6973d4279e6d392d1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d9103e12c5664f06efb547d45eef5671
SHA1c3358642ba733170df4b7963950a51f61b0c2361
SHA256d38f09375647566a044c368d3b89f1b0a54a57d718f3e223a9f258d83a923a81
SHA51232a0aca55e2aeb14d057cf57b21dd64fed1366d37b646d4930b26ff027426a9f3ade32e969f8347aceefdfa10658fee0f5d791cdbff2ffc51c7eafd7799d06fd