Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ecovadis.com
Resource
win10v2004-20241007-en
General
-
Target
http://ecovadis.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 4792 msedge.exe 4792 msedge.exe 228 identity_helper.exe 228 identity_helper.exe 5980 msedge.exe 5980 msedge.exe 5980 msedge.exe 5980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4880 4792 msedge.exe 83 PID 4792 wrote to memory of 4880 4792 msedge.exe 83 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2220 4792 msedge.exe 84 PID 4792 wrote to memory of 2664 4792 msedge.exe 85 PID 4792 wrote to memory of 2664 4792 msedge.exe 85 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86 PID 4792 wrote to memory of 3276 4792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://ecovadis.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b43a46f8,0x7ff9b43a4708,0x7ff9b43a47182⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,7959780609081392953,1600336305129426725,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize720B
MD5bcb9e29b732aef938b53c84381ca3534
SHA1b9191bdb3a78cd283f38cf82cfcbd74604364710
SHA25605fbb59b1abcc87eb04d4b7f389b25a3a874c29a6035af969341900b6cc5e5ba
SHA512be0d56f461fd8fd766552cec2e2ca5d919a345575cefe778c305df8fef895c3feb90a77a414c1acdf2ebfec3cf59d2456bfb139653bdfa3f65deecc1cdc7af69
-
Filesize
1KB
MD508eb5231431eaaab8a15e7ba67e5ded3
SHA135205106268f9b41ca5c401dd5a431fc8696d4ee
SHA256c21435c763e67d59547bcb9adb6935e64244d2ab44a5134145ee3c4c474b61bb
SHA51256e99c6457529c3f7f3ed4e78ef5843ce4274caa0cee8028209404b39eca52881fbed1725fbb2330019ade44eb10c61722a83df2207f86ca7c4884d061aab089
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5df432e9938d81dc6dff0d319440fd534
SHA1bc843091d1015470a8d457c773a839d635883259
SHA25625a92699c0c9327effbb449820d15c124f3ff7e948d3c7bda6058b34862780eb
SHA512f4fb0673657486ebfab6aea9c825538c096a10701e36437e8cfe3f01de6dea26b458302174d1567311ad77bf1e67aed6baac78ef66804b7339f1bd40d94db313
-
Filesize
5KB
MD5226e428d8cf55dca98b759ce3641ded3
SHA1ea6f35e92dc080cd497a7b171f392408aed5d485
SHA2560034d16200e62eede7bad84ac871afd08194dcd891ae3f2db1859e4c5d5924de
SHA51247ab3f1558d93f5feacf950cdd1bba3fdb69e793c9e17bd3e689699733af961f3daf5292875e53aecad778563f773f5d619a0d9f2c7665f2370ad3f3d5559b2f
-
Filesize
1KB
MD5b32f0ff987350641b2d86fb7f13fc303
SHA1d4b4371ceaf6fe67f032c8dd38cd62c4232904f7
SHA25654779f43a3d1a7112c30ad6f91cddb46422a2181f55705dbaf6da8629803c2cd
SHA512713f05961a259381f3fa0e29e6a7ea3673aabc23eb991e75fe26ac82e34571d34792f26bd9d70e1b877af30d2c493d64fc528a2a1cc51f9e2be7a645e3b3681e
-
Filesize
1KB
MD5007c8f7d9758e6a93f475da8065fc254
SHA16168ed71485207f2677145d394f2e774217b47e2
SHA256b59adf6885a4ead890f7ff2e4d353a71a8b00991b39d022e09a37bff5fdd653e
SHA51238ab8e3b2d52e54eb8c9201fb4b11e6ef60e54a1ff1f114d0ddbfdf0c5fd9acfc1ef10c4fbcae8e93f06b546f15e67ffe3ddfd98e805840c7bfb8c991f932822
-
Filesize
1KB
MD5a15703ae599d2eb0adabe181c9699401
SHA19e855bd9ca912b5e84eab20b15775f6cc5d6fad1
SHA25669be9410a39fc3f2fe32e2694caef65f81380496cebd8737aa77908234f7518c
SHA5126937a876b57fab9b56cc64d7c1a76aacab2da0ab5cf18f4da720937b879337459157969e2ab7b879bcbf59025b93c96ea593234310db74625329abc0f5e147d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50376032bc15bdffb74538a44016f5224
SHA143aa98f018739b47681ef1992a7326a3f0bb5d7a
SHA2560a3cfc24e0901699faf84c5b517f8e99d9aadb33082bb857de8f296f4bc6b2a9
SHA5126a1156e05ede3cc047b7e869e4064473e68e906243745a548f3de8327aed763dad63e25ad195335d66c551c137226688c422f950941574b4db3bd5da468db8fc