Analysis
-
max time kernel
80s -
max time network
86s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 16:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://incoming.telemetry.mozilla.org/submit/telemetry/4ae7938e-aae7-46ae-916b-188183930d29/event/Firefox/117.0/release/20230824132758?v=4
Resource
win10v2004-20230824-en
General
-
Target
https://incoming.telemetry.mozilla.org/submit/telemetry/4ae7938e-aae7-46ae-916b-188183930d29/event/Firefox/117.0/release/20230824132758?v=4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 2148 msedge.exe 2148 msedge.exe 1580 identity_helper.exe 1580 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 1020 3116 msedge.exe 85 PID 3116 wrote to memory of 1020 3116 msedge.exe 85 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 3880 3116 msedge.exe 86 PID 3116 wrote to memory of 2148 3116 msedge.exe 87 PID 3116 wrote to memory of 2148 3116 msedge.exe 87 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88 PID 3116 wrote to memory of 2224 3116 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://incoming.telemetry.mozilla.org/submit/telemetry/4ae7938e-aae7-46ae-916b-188183930d29/event/Firefox/117.0/release/20230824132758?v=41⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91cab46f8,0x7ff91cab4708,0x7ff91cab47182⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,279560341122314392,14674955662111014653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:2844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53590c7788f1f36717cbd298007259a6f
SHA19e9a602016435a1d642e18a54d8d6589f938a5bb
SHA25609a08de2fcd19e304c3b8f6e04f5e4da257a3f18759827be4e9c6af862412174
SHA51207df3ee7e2d4a313c996c6b8451450556a75e5ac8e4d10595f255164fdd25d6bc596ad579d90f6496c78a15a3c6fc349d748dd7c5f4b2b51d330c52577e2988a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
198B
MD58a702c4d29bbf165fbeefa8cabb69fd6
SHA10499969108c7fefdbc3fd5f5ad5614d02231a1b8
SHA25695be939abd4031dcd250635aed9622b571eaa4a574230051bd15288385ad4dec
SHA512a0213678f038db6274b96aebc7c7777fef6901b22141126e22d18903bd5ced900daf277c8b6b8a4419c8baa9bc6d071527b64213a72e53524fddac0a7db4b343
-
Filesize
5KB
MD5eac97089ded41c3a0ce93c563d0e328d
SHA1388dab39ee081599431d78b107c5534339f12020
SHA256362a5df32f213335be29a82337a6631a15f3a97832f19e54d07c7d9621f218c5
SHA51286a6231f0ec75a23f67b8d74bd0f4f36b998054b08133e201c7de5785aa6c21e7fd600bb57ff9433e1e31dbf2e0730c84462c9234338e3c386dc1315b39a43b4
-
Filesize
5KB
MD50db62abfb49f4561d4a87fd7e6fa3f8c
SHA1b73a7917d372b69694ed50899bdb9e006b80d99c
SHA256ff524bf7ad3f870428fff84490982599b98cf0d94ffab1f827d72bdee1499fed
SHA51279ba4a684ff4eab27505d2a5daf11080a6084060ca3dfd65f32ff650a23c1e532097a2a61b3a3f8657e4c79767fdf8164d476694c1e7933cf2caa56dec01f8e9
-
Filesize
6KB
MD5e3d152e94c6d54bdb85e14987d672d47
SHA151e2a53a9ca3ef68c72df3dae42ae37b933f74f2
SHA2568bb1322c8da16e8e669a35789fd91736a988edaef9f450945d102af99cc2e6dc
SHA5126aeab5c6f4c9bf77e0d4dfab4ee94620ccbeee13b86f339ba7c3e09caff92ff8faf944de31a74cb8e67fe303fe611ba6f1511bcba3e70ba67590275758393713
-
Filesize
24KB
MD5a128973ca2ca245299ef7e60156b4ef8
SHA1d39a437204591bbff98d673e6d1c4f869683ebcc
SHA2565c6e1f3c7213460c24dc670521adbe32ec76df5e3facc0a7b92a3fa9e340b302
SHA512bbbdbe2fae61c2a27b4aadfbda2efae2675156dcea6edb8b45fbe83f397f8a1f50d694d8bcd1f53939a277722baf102f3f80caffadfcf0ca80d7408d77d8c490
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5df1195ce3c20511eeafe8731c4b271b4
SHA1ca7c8a5d662d366437bd440a14a758a9f62016c3
SHA25638da63f59e784199023c93538dd18ee20dc0924d1567533306ed1e9029474c29
SHA512da89a201c92d007c601b961e635ea1d03b101a50125c4fecf9021b3f4aad33c4cf02393ee13199f70f828d9ef9de1742ecd507837db06f0c6ce4453bb9ba56b7