Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 19:31
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 1736 msedge.exe 1736 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1904 1736 msedge.exe 57 PID 1736 wrote to memory of 1904 1736 msedge.exe 57 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4336 1736 msedge.exe 91 PID 1736 wrote to memory of 4328 1736 msedge.exe 89 PID 1736 wrote to memory of 4328 1736 msedge.exe 89 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90 PID 1736 wrote to memory of 4516 1736 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-8.1-and-8/hh825070(v=win.10)1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb51946f8,0x7ffbb5194708,0x7ffbb51947182⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,124230135133743261,7054943899754482560,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58f30b8232b170bdbc7d9c741c82c4a73
SHA19abfca17624e13728bd7fa6547e7e26e0695d411
SHA2560916f816feace92a097267171f8aa8f944074530574a7aa1f9f0334899dfa3eb
SHA512587d973b13b97c5b92621c776c18348a13ef451ccda32977baa529de33e47a27e7920a57fe7c4d0b2f0e4a8a3bca5c62cc5798cf97f19556028f88afb38b37be
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56e46e98f2af405e79e24e6357ea3de32
SHA180cd60d3bdaa438efe87739e25900ce5cf2acbaf
SHA2567552a8c2319f954b8d1035c57e570e20b2b268d023f0a319725cf3a0ec1c3c43
SHA5120a32c3881fbd4efb6d31c65233b81af781dce12c698020edffbf3cd49f5f5cb0f76de3b2c4638cda87d378fd876d436f3a761dc488420381ee9b7d6c143091c3
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5b7f2bf514844a7e829c5dd01e389692a
SHA1bb0d5980e3a7aafb6b95622d56728ed082c43dc9
SHA256818a7754f67d5e2cfb8c09d6b6569bdb47fa74f0903f492eeb1633d69cf24e84
SHA5129f4d135402008c493768638f7e677bca0f159fb550f0cdbe5368434083818dfec4555c0229ead37635c13495a2a4e4385db5fccc7c93ccf59c5f3d87f891c557
-
Filesize
5KB
MD5f75534883ff366ae2495685094cb1ec1
SHA13ccc78d6f14073190e292a30f74832f91e06abcd
SHA256f808df2afee7eda6b594fd6bd70f6df5f4e1c5b885605db117abd8d85ceed239
SHA5126c5b34cdf0dd7b7e48ffb12eaca496435b1044c4ecfd614810933f9f50676ec680450ac198fe141e6490e33adb9fdcd28033f418e9f9d6a64d83376038123f9c
-
Filesize
24KB
MD50b8abe9b2d273da395ec7c5c0f376f32
SHA1d7b266fb7310cc71ab5fdb0ef68f5788e702f2ec
SHA2563751deeb9ad3db03e6b42dedcac68c1c9c7926a2beeaaa0820397b6ddb734a99
SHA5123dd503ddf2585038aa2fedc53d20bb9576f4619c3dc18089d7aba2c12dc0288447b2a481327c291456d7958488ba2e2d4028af4ca2d30e92807c8b1cdcffc404
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD502b2b29bfb63daf1588bf5c4f7aed912
SHA1c13b77b4776da656e0b595a68af00e9bae37fa59
SHA2563a33a756c366cfa964accade7a4a7740e1dded094db3ed395c3b2889977baf8a
SHA512a7ae583b8ad2fcc9eb22e96ba4dabf0233a1447ce46870b0a2a765697175550b2f5e334351659f9ca9a1da02511a87996f416db8a2d023906091d3c9db0d5ad5