Analysis
-
max time kernel
68s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 15:23
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 672 msedge.exe 672 msedge.exe 4572 identity_helper.exe 4572 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 672 wrote to memory of 1936 672 msedge.exe 87 PID 672 wrote to memory of 1936 672 msedge.exe 87 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 5092 672 msedge.exe 89 PID 672 wrote to memory of 2464 672 msedge.exe 90 PID 672 wrote to memory of 2464 672 msedge.exe 90 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91 PID 672 wrote to memory of 4504 672 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://schemas.microsoft.com/office/2004/12/omml1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6f0e46f8,0x7ffc6f0e4708,0x7ffc6f0e47182⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17047884066776323023,1386908722119049708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD50f9da45ad70d4479b6d41240bf9a2ca5
SHA1927a29ca4056fed1a038c43ce36f2ee351d27cbc
SHA2568f81a82d4a1820b5b607faf758ad8662c9bad04567b4d5bd08d975a29c2e6fea
SHA5128c959ce2cf9eede6eba484302ede3da76a72714b4fa34db23ea695d59e020619a486f3b3d0cce6dfa1d8290779baac20957e751865887e8d05427f9476560539
-
Filesize
5KB
MD502cb9bfa7fa3e525cad33401d138b65b
SHA10b447210266a3ec68bd2c5b5b6a7aad402583040
SHA2567b0088d128dd4843003aa111b36dd0f10c3139e6df6059b3b16cc337335d3337
SHA512a7a432eacf2ec1b5f2fbe31a5c2b8ca27ad8566618c4974acffefb80d5fd248b3846ae2471e06c67cd6d8266545d4f18d20934a06e10d9b71fd77fc1b0a2cea7
-
Filesize
5KB
MD5af5008fc9495912e83af46050bd234c9
SHA1c6a16ca4dbb21582f22cf7afa9126b4a47dab1b8
SHA25698a2cd7b56ff0711e9655ef83d34c32d3144f6dd48909c8f3aceea999e7f81cb
SHA51275ba906222eb92a4bd5d2be0e4c2e5e31aeba601dfb5afb10b4a4ac1fa0a0a498f506b7544f84a4733485d391df3f21c205016c09ff8267a0dae5a9c33f0e8c0
-
Filesize
24KB
MD53a748249c8b0e04e77ad0d6723e564ff
SHA15c4cc0e5453c13ffc91f259ccb36acfb3d3fa729
SHA256f98f5543c33c0b85b191bb85718ee7845982275130da1f09e904d220f1c6ceed
SHA51253254db3efd9c075e4f24a915e0963563ce4df26d4771925199a605cd111ae5025a65f778b4d4ed8a9b3e83b558066cd314f37b84115d4d24c58207760174af2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD567f251c8749e1e85298b5f29fc5e18ec
SHA128f40393d053948f731b442c8fe615629504a305
SHA2567cb1ea5c012bae777d1481f9471e56c9e1ce1a2ef6e4ddbc917bd07de4c05ba1
SHA51250ae345140ded103319f882c8081b3453841d46a72ba0d3e4fb972259c1d486d925bd71bf3b835817f3100566f911cc39885e7cd1364ea6966de198b86e10362
-
Filesize
10KB
MD5c08cdefc04900c086cb5c68ef9070696
SHA18bac96d700ca3857bb32704ac3111e0a5b3c2f69
SHA25673373f2b8cb4ac218b5195656019ea0d65d82a9f70826d9d87abd77896ad73c3
SHA512c2c4d7e929e6e5f3cb1d76b8bcb4e0b634a48b6067da8bda8cb2c5e380575cd907f921c03908db2e116e4749ddbaaef890d32f535c445b9413c6a7bc9ce89c45