Analysis
-
max time kernel
75s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mercer.com/en-gb
Resource
win10v2004-20241007-en
General
-
Target
https://www.mercer.com/en-gb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 5008 msedge.exe 5008 msedge.exe 3472 identity_helper.exe 3472 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1188 5008 msedge.exe 83 PID 5008 wrote to memory of 1188 5008 msedge.exe 83 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 1404 5008 msedge.exe 84 PID 5008 wrote to memory of 2536 5008 msedge.exe 85 PID 5008 wrote to memory of 2536 5008 msedge.exe 85 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86 PID 5008 wrote to memory of 3948 5008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mercer.com/en-gb1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbcbc46f8,0x7ffbbcbc4708,0x7ffbbcbc47182⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,17931203135013443886,5869266305222154295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:3644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5a44b502613ea9aa8275e18df68c4c52e
SHA1a1f040c9bb67d672f2c768942e6c12268ebdded5
SHA2564719131435c8e999b871163e082c43db21ced2cfc16495a80a16f2ec2843ee9c
SHA5123e006b084d577e2b5834686dd8c62cc806cfb48083fe247964abc1af22e99479f6b779f24a0e1763c982ea3488bb46aba003fc603c5ae89c98bf376e75701a31
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD5463aac4e43ebe4d45c1a2438df3965f0
SHA125c91780df434d702dadfb20e9d95fda3e4f03d9
SHA256a2ecdaf78253139f7f70ef92f2ad92dc2958c271e02dfeaad00385e3e86ab45b
SHA51242ec3fd179be261d46081a8eb1711812c131caa8047c6bd2976a36eefa35839e75d2fda1869a1d5e6ffea1babc8a5381b63d312ef20f2720785632ccadefa8cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize600B
MD59432a034c398eaf216e5bfc93d9335dc
SHA1071d432f38d62e70030b515c42634441644e0274
SHA256fbac7ece1747bea2b73251da7f0fb6999832b3734990dfabc53d4fb245235f91
SHA51271a49a3b1b38818cbd17a55201526e1c07fa1a0dab5d9c01890b5e3e08a3d81d5ce07147fb95571caa916885b717eee98b2f7636f99b7f3c7cfa58f35cda3202
-
Filesize
629B
MD5778a2d3886e814f3492c9ea60adf3de8
SHA1e7a17d847f875fc402ac4b6ae8da0db787d315e0
SHA2561ed18914dea52dd6e2f8cbd2a43dda4217a152e37bdc747f5d1d831bdcc22c91
SHA51237b97d03109d5b6e1fdc3ce09f03fdd6294562897167cf9da74b958ff8308a56b1eaf08053332782063c1eebea9b97375f434d0e08ad85d5da9804e928ce3eb5
-
Filesize
5KB
MD511839ebe1787995740014761030c0993
SHA14aa059a3e19d2cedd680bc4f2f05bad2a39daf36
SHA256db557059a46cbdad32d870b6fcded63f46507544c2aa866eb164d3c5a3500e0e
SHA5126c427a312fcd44b302c69a7cf37f6806e2662820e0030199a887ec31e305f2bc0b7276740602a00950fe8ed9d3fa91bc14924159bd6418cfebc636c1a76b7235
-
Filesize
6KB
MD5357682e48069f1a1f40eb3e485723d93
SHA1e5c39d355728ba96402880046dad359229f91211
SHA25695b95265295e05ec126c5e87ef501d43092c3e84f2225a94261d5c5a45456938
SHA512bd937728c1ce8cce3f0a6ec63d01418435859333336b093b08c7ece29c5bc2f75b66fe0700ae5dc5643c901f78c5ab72133650dc5a5e21632c9fc7118f079356
-
Filesize
6KB
MD5dc79a8dc28492b4e1706b028759cfb67
SHA1add4084dacdbf99fcb029bb229032435e15db13b
SHA25633a4bc10f4e7473c4ecfe64af204492ea4da5081080ed5b63d8b83c8b9b529e2
SHA5122cc402b1ce04b579b13816f6568c7c043044aa2a2a54442f7db5a9bcd2ef8b0d7aed7c0ad1c54b8eb476ec773695f5a12cb9e380f9f081c4ccf9e56ac6de0cd0
-
Filesize
704B
MD54b5bfdd533751fe51ca022b0c1b002af
SHA164d29f82bb398ce2b44244618807a4330bb20535
SHA2569b3def97de2ad769d0e9209db0411139bf207d171a39c72e2ccdd5dfc8736ef7
SHA51254692f1d67cce01fe2423f6ccce161c12c9c0c4d0b45659ce9b13fd54e5e073efd42032eededa204f8fba5eb63da752f300c4ecd58bc7e9d3c323a82a7518358
-
Filesize
704B
MD5537d68e339b6b33671db9da225ec854f
SHA1f8096c89462a8b9e9e79951c1ddc6cc397717474
SHA2562fb671696efc1c58f7a86f5e2247792e8e685d4e5443e59fff4143de7998ceb7
SHA51249a0baba6c2e16119afb0c4493cb6ebcf0bd8e50fdac4e8987dea14ee4134925f78def6fc7109dea14f3ea935ff1c6e2a87021eebcb0066973df61f87ef59f4a
-
Filesize
702B
MD53ca740d5d6a439ce3ecb521aa2c84760
SHA1fd1ac0044abc272ecdb10d5d285ef6edbd9164db
SHA256cb9f75e710afb8ad5916a0b354b1b5c5db4143f4cea1ed57cd1e8dcd8a05a0d8
SHA51200edf56c056a715ded92db3abf17ebd9fba8d84bd7bd0372e28868dea75468a4b60b4b0516f29202092e376475486641363a7315e6fcc991ee003f1c48147ba8
-
Filesize
704B
MD50efa23b33bf6a1fa84b67fdace84935f
SHA14c830588a09a3a52bbc1f59e1ff616705ab34b3e
SHA256ba6ff24735a205aa91431db1ea7b5e030fd9af7e227c8577aec13c66e2635c2b
SHA51252a9378cc8edddfe9fa716b4ebb12b0983970667a7de170d41039a8abada65c55d5e738435b495169d045eaa97f0d9f37b588df5d2c8bfa5dea01366cd8c49d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54425425cd3bf2b3d5693e4971e5fcd5e
SHA190ee4c99661dfbf288bbc1738aae763e08a173f1
SHA256b5b7ef224ddb545fafb245c8e4842d3e0ba2654c907fce5a4eaa07c049a75354
SHA512c58e271f2d000a3edb2eb8dae4690a3b73a9499d2d704265c72cc0f40cfc606e1527ca829d2251107a88c40f01e5a962d8ebd0b45aeacfbcfd16ac032c20a328