Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 00:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.hybrid-analysis.com/feed?json
Resource
win10v2004-20231023-en
General
-
Target
https://www.hybrid-analysis.com/feed?json
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 2484 msedge.exe 2484 msedge.exe 1016 identity_helper.exe 1016 identity_helper.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2484 wrote to memory of 4292 2484 msedge.exe 57 PID 2484 wrote to memory of 4292 2484 msedge.exe 57 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 704 2484 msedge.exe 85 PID 2484 wrote to memory of 4956 2484 msedge.exe 86 PID 2484 wrote to memory of 4956 2484 msedge.exe 86 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87 PID 2484 wrote to memory of 4432 2484 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.hybrid-analysis.com/feed?json1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff918ed46f8,0x7ff918ed4708,0x7ff918ed47182⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7617785706384376577,236895124609668595,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
191B
MD58e9788a644e235e1a76f40bc09a77667
SHA17d4d46972b3c3b4612bc8d04c52a3e11cc16dfdf
SHA25698c6978ad381f77905100ff332f77b917d10d0afc8dd968be83a695ecf2ccf45
SHA512a7584319177327b8a8b650be442697a2121328d56a0bf6a74b0751540dc80176d8d6bd2cbe380f89d345fe2e38e98dcb5195de480e106979ed19c94cf25269d0
-
Filesize
5KB
MD5e4d4081953ccb96098325ce803451434
SHA10d61a8edd251bf6265cec3236d1fb033d491fac3
SHA2562f8863bc00f3db7c9bbfc394f944862e2131e26f68a2cb04e61785d34ab17305
SHA512cdf109f4e240f19c83d7b727125fb48637b226bb4a7adfa173a088ddde81250e4dc46af9434f9a2722f8983d65aa03fca5b33474527fc20d831428788564b66c
-
Filesize
5KB
MD5901cb384182a797e593c547fd1995848
SHA1d3f7506fb5e7f66b68b8de0114d1164369cac5c6
SHA256594921fc0e03ccf1c2223d718443514626d9f741fddabfd172c814f69beeb823
SHA5123a29bc756718356a08366a081ed58e4be220e37088fd47792c5566dcca0fac6828254702c2f62329f369df8eee55006da420ee3aef8e5ddf4caa642cd9c361f6
-
Filesize
5KB
MD59f1fec50de4ba60be5a96c52b6c32f5e
SHA19956c8589a797959c71b5d293ebb835af63a7e5f
SHA2567721a2dd0eec09ed5c97e23e4f30b89a6149caa0fa005eb5f3e9bc993f0f4880
SHA51223be249e623fcd6cac56b6689f1ec3281e93a60d77368b190dcdf643da4a5a52705bfdec70a78e29c304d9e7b118c7cfad1d7e09ee43e95c880b5f741a3d69d7
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
201B
MD5246f07dbf136e80305cd88bc2c85388e
SHA10b5bc6b8fb8112b0a1618f121580be700fa55850
SHA25693b4a28c91eb34b6c51cb74ef537e6cf498ca762d6c70a34f0b6a9c34a14709e
SHA5127e964261324dff928e5106f72148950c02d95889014d7cf2fe414bd9ceafd22ab8d33334747a052bd926bc936cb6657c7dc4c337a6c98b796825eee54ab14dcf
-
Filesize
201B
MD511269579e8c4baec7d98673e1fe10b5e
SHA198b2983760cfc16e23ed67fbac547c302a2450d6
SHA256bec1608d85d4677b02de10c1ce19bdedd63615ca71e2f0ce4a25aee42f2499a8
SHA5120d6330563912467b61726783c62796d4646b677bfba601f9d9945e5904c451ec0e1bc6293ec083a2a02c1ee8681a039730f28df3423cd8f0a9b1612e166c6944
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fcc52a73d9cf72d326a924acd14bb50f
SHA12c9955cd8dfa1569bf47349a5abc4134c0cbf1dc
SHA256a21432c2405cc433e0bd42bd4270df6757a6ac903595cb186bb461f434feaf1e
SHA5122fa3ea8ac2a71ec6067352a62241b904d75d519a66118ab1132d79923c3ec67fc092965f090aef9b46c4fcd1445211195f69f39f2f61a071c9621fa380f5d98a