Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.amd.com/en/corporate/leadership/david-wang.html
Resource
win10v2004-20241007-en
General
-
Target
https://www.amd.com/en/corporate/leadership/david-wang.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 4432 msedge.exe 4432 msedge.exe 2512 identity_helper.exe 2512 identity_helper.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 5024 4432 msedge.exe 83 PID 4432 wrote to memory of 5024 4432 msedge.exe 83 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 4804 4432 msedge.exe 84 PID 4432 wrote to memory of 1216 4432 msedge.exe 85 PID 4432 wrote to memory of 1216 4432 msedge.exe 85 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86 PID 4432 wrote to memory of 1972 4432 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.amd.com/en/corporate/leadership/david-wang.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed61946f8,0x7ffed6194708,0x7ffed61947182⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2312 /prefetch:22⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10160835781385766051,13456671410349404765,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD54fa68259552359a8bdd375298cce3a47
SHA13be683b3bd1a0bfa6bc970ab63bd7967f39162ff
SHA256d9666bde7a953483c4d1c16d7977b25836dcd92a6e1aa5120012295c6da87789
SHA5127957602c53b3d894fb7c7cb61071a50993145c28f836168a3fd0c535967275cc5bdde9c9462be1bf85355a2ef723a4af849e95eaeee2ef15474ca4dc93589fea
-
Filesize
1KB
MD507071d40acfe694a725d3bfc4af56928
SHA1937ae3e08d04aafc2516bb37532691097f8ef0af
SHA256f18932ef8943a4efebab7acc734e9e77d2cb55ce5a00aae8fd4d5b20579b1e90
SHA5120b2d24d966e33b5a68b29afcd50f7e243db6055b5ccc4a6c02d00f7fe11a8324f86826dceb7da36d01dba5a6f334444b2ad2c7f71d7d6e51cb235b0be9fffd13
-
Filesize
5KB
MD5d72b523459180c8aa97c7f82d5e31102
SHA18fb209838eeff6a33ca8d46884970491d100bf50
SHA256fc1f2a028bef2e88a749413bba8b6dd50f334ba666b6937a93c7bfffd8d37bd6
SHA5126ab84e14dca8e6ef61c06221330559a2b7ca5ca0e8caf43c1810ec6c47fc13f8f58300422c0dc41660f8b5f99d9d00475c7897805d2e61e72b2ba5c83a757ff7
-
Filesize
6KB
MD5199d6751e7c60dd8a3247c2e1cc6ed46
SHA1de22ad595b8a36dda142f6f7fa0fab26ec62e418
SHA25611c7fc25a320ba7ebf353d7d6905a9a36b69503a0291d4c4534c0f99039253fc
SHA512343bd338429ace1c249bb56cc470dbce61502f9d27767b8b10f9f182f9d176a23b889789c60f97477e2541ca67a361889ba11989a16e2605d765eabf7b0b55aa
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5fe2acd5fcc290e8d5781d7da4e8327bd
SHA1e2e4669b9c09fbf79759ab86e0e99d9f1a898cdc
SHA256eee13c544c870cfdd66a3f773388164b2775abab1f6aeb103062df75a073007c
SHA51255d94196e519d6001aa553cf159027d5be15a9feb4a0766adf703cbe4c2ecb62e65458c1e1b801f02e0acdc0a129b0703cc0621637703b343a1305be7eab88fb