Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 18:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com.ar
Resource
win10v2004-20230915-en
General
-
Target
https://www.google.com.ar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3684 msedge.exe 3684 msedge.exe 1988 msedge.exe 1988 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3576 1988 msedge.exe 86 PID 1988 wrote to memory of 3576 1988 msedge.exe 86 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 1440 1988 msedge.exe 87 PID 1988 wrote to memory of 3684 1988 msedge.exe 88 PID 1988 wrote to memory of 3684 1988 msedge.exe 88 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89 PID 1988 wrote to memory of 884 1988 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.com.ar1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb9d9746f8,0x7ffb9d974708,0x7ffb9d9747182⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,8636369957177373060,9438648480190938765,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d8f4eadb68a3e3d1bf2fa3006af5510
SHA1d5d8239ec8a3bf5dadf52360350251d90d9e0142
SHA25685a80218f4e5b578993436a6b8066b60508dd85a09579a4cb6757c2f9550d96c
SHA512554773c4edd8456efaa23ac24970af5441e307424de3d2f41539c2cf854d57e7f725bf0c9986347fd3f2ff43efc8f69fd73c5d773bbfd504a99daca2b272a554
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5cae751daef17be04ee4660b705230532
SHA178648108d281c0b26f605102def53ffef07c5739
SHA256325f2d999604d9e9a62a94c2f6c89451e05a21aa8ac24eef53dc4e9e155c8e84
SHA512272b85f084e59b04f6101483d50d63a4f872e4ec00985e183ae5a3d4464883de294c1a75cd5cc486e5942235c21dca213fe9ce2584d1b8a4e14d4102f93f982a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD55a6a3933a2f7bc95147990620966fba5
SHA18a3e98ddc351e2733d8828d075c6a682a86bbf35
SHA25684571e2a122ea2204edcf398ec3732ffc887da3c7f17c0cf321b87ec004f4151
SHA5120c60bc381fd5bdac5bab94e86e7541c0700dc57c8bf2a10cca2105e3cb6b00001388a858bc7467b5f8a743edff42b3ca2d9676b06821afc2c2e51ee5e194bdc0
-
Filesize
6KB
MD535fb362f371dc084baa994352bc22546
SHA1da3a2077d05e489232498525ef7e0d49ad86e09a
SHA2564c10751444f1b5c0cb4f2602f4fde79cbe5d43a19968d370d9b7bc04299f78fb
SHA5120adc72e8b89ac23af046a9c2d581172eb7f3c6386d6253ffdd8a0f00e710ebef88b6140dee040cff9f459dd79b777bbed22c82e9d33b7b143f614abb2c4ee73c
-
Filesize
5KB
MD50a7732b5bb16cd13dc63f58ff80de807
SHA1c963881d44387b583a7390cc7a1bb943e0b62696
SHA256f96166513fe23c08115d9a80d568ef44d28e108d7c14e4bdc6df4209031dcafc
SHA5120c40c14f17752c47c6ccd503b6b39fa1926ab8aa9d02707a510067c235ad0ef092901a1ae9e4135443846fe49c97ccbd8a1deab0050371a4a73039bcb5830169
-
Filesize
24KB
MD5d985875547ce8936a14b00d1e571365f
SHA1040d8e5bd318357941fca03b49f66a1470824cb3
SHA2568455a012296a7f4b10ade39e1300cda1b04fd0fc1832ffc043e66f48c6aecfbf
SHA512ca31d3d6c44d52a1f817731da2e7ac98402cd19eeb4b48906950a2f22f961c8b1f665c3eaa62bf73cd44eb94ea377f7e2ceff9ef682a543771344dab9dbf5a38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d3a852acce78a6dd3a19bc6da740dd2e
SHA11b8de0e283862ea09640057e229c43ec744fb171
SHA2565c8041180f769f4fe31010fdefc9ecf456dbea450b2b203183bac7598eb41932
SHA512f450fb87ae4e34633062a4b353aa2cbc617e9a955265712c7a364d5e52df898af6bd47b8f9fcdb8e407b3540d05894264d7a952a887ea40ca32d9038806b564c