Analysis
-
max time kernel
240s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.infineon.com/
Resource
win10v2004-20241007-en
General
-
Target
https://www.infineon.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 1716 msedge.exe 1716 msedge.exe 4480 identity_helper.exe 4480 identity_helper.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe 1716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1416 1716 msedge.exe 82 PID 1716 wrote to memory of 1416 1716 msedge.exe 82 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 3596 1716 msedge.exe 83 PID 1716 wrote to memory of 2928 1716 msedge.exe 84 PID 1716 wrote to memory of 2928 1716 msedge.exe 84 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85 PID 1716 wrote to memory of 3920 1716 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.infineon.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa380546f8,0x7ffa38054708,0x7ffa380547182⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9107186338038561599,17483691902213089537,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD52f17247296d96774e78c8ad5ed3ede58
SHA1ca6be4094e4188cd5e1f26650e8199ef6d1dde46
SHA2561c30a4a0c45b18c30591d0864647df00e0689e9c31bb5b39c6bda720357e973c
SHA512571f1d3f21cdf7075bd525cdb7f50411cfb911e823f0bef4d4343d0a560ea2d2e8a02b37acb7d59f11422c56310ae3c3108193f5d43c97f08f1070355ba96f6c
-
Filesize
832B
MD5c71f2da25b148da84243a8eb235f0150
SHA16bab7769912252e73bb13a6064241f22210d9dad
SHA2567f1772a964b2fbf76e586250a80c0621d40a7ab2150901e467c2e342c086f406
SHA5126af53bdba8cd6df62178acbe4a3bcf9294205ccf5bf7cdb74788a625ed4701a55fb11375c523df3ef6199aa2c780349a8d6627a57964d02cc2d3cc462f9e883f
-
Filesize
832B
MD598b0546cfa9dd041b009e5877e466aa3
SHA13dc07c684d62373b6fa3104443d49463cc509edb
SHA25619d97cc93173624fe17c823da22f448679c05ebb72b5dbfe96561d0b41a5927b
SHA51270971a21c460904a27d030dea72c6dee426aa991f10ca23a9f4a9b9c9d0fd65666f514cdf07e967d7f425c753a3e5a65a73450db8b36442c9cfe84eb9be81620
-
Filesize
5KB
MD5a19b3a73246ef9b263711b309132039f
SHA18820c437a7808773dc93ded4179bec24762792c5
SHA256495586a442f396f8189dff4f5ccd9f1a3a617a8bc1ced0e42a68fe35342e3ea7
SHA512a164f235a98e0d53fc1e16a735340826b4b5710fb34479597febb700d73a06782861e5832197726741624ac717a1bf6baf872507cc403e298cf88d9716cbd089
-
Filesize
6KB
MD565049a39ac056a28f9f50d2d7ceee0dc
SHA10dc294c3a2e2af44c3ea7a1cc1fdbd2ceddee8ca
SHA256a329f750fdcf88fa16da9043e9f026843f6319c49194e6dc335969771607924c
SHA5126d8e97778742434a6a1aa85b5b7883d1e0f7dfea901fc08c338eb5cb056fc7f802d0e854c31fb270e1248821b93526d379f4ac661286ad6a3345bf8267862fc7
-
Filesize
704B
MD5c783cacf4042260ecc7cf0f425fd785d
SHA1cdf1aa5af8af501afb0f5dacfffa1c5528ad1c6d
SHA256acc672b45a65e7cafe320b24fd50bc1d954305519f94a3a8714f169a95fbe754
SHA512b5db1bcc14b66cce5c27cfbf023eea3230e7bdd33b752d7af576089e4ec057bee84536dbc6cba765640d2edf13a8b9613d282f1376e5df44ca1b549eafbd102f
-
Filesize
704B
MD5c701d008810f0660c4150b4caf1722f2
SHA1cde2bc475b91c02268f7bb40edf73c3a73ad808c
SHA2568ae07f75798040be2c4d73d5054163d2dd5978ab8f9cd2c06b721454373c1953
SHA512583637af3516935dd3bdc7de492cf37b4742adfd43ce76f06fa0031d6af9ca17afc80954d69b01808fbaa3f5c6f53b2e0aa5fe1c3a6640b2fd15e946fc4bde2c
-
Filesize
704B
MD50bc4a46da412ce2aa99bb49d87dc953e
SHA18797b42aef077a5dc368c23cb69bf8510773ae08
SHA2567d62800b4525f4a150780618850288e83224de1642409281a11759dcb6dc8bb0
SHA51204406457d4bbd46bee2b3a910209e195897779b64816759a2f4ccdf6aeec8582363055f736649bdf8c3d233e22f22e20316411f2cfd15566ae1e15b243ccba33
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56f0b8f18f1dcb047bf20ee2e7e01acaf
SHA102b005c44a458d92185fa522c3e13d5742cac015
SHA256b5d57d15927d1f166a34d43e8cd67cc27171be6787928b873457f418f484fc52
SHA512e469bd493f93488417c90e8a1e44704fe6e738e07af5012ef905bdd2072f8fc4de7fff9cfe193fd233dba60dbbd3cb2824cfc68c12ad9a48d9cfac7fb8336647