Analysis
-
max time kernel
1736s -
max time network
1762s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 17:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20231215-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2616 msedge.exe 2616 msedge.exe 4684 identity_helper.exe 4684 identity_helper.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2752 2616 msedge.exe 89 PID 2616 wrote to memory of 2752 2616 msedge.exe 89 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 3060 2616 msedge.exe 92 PID 2616 wrote to memory of 2432 2616 msedge.exe 91 PID 2616 wrote to memory of 2432 2616 msedge.exe 91 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93 PID 2616 wrote to memory of 3932 2616 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cac746f8,0x7ff9cac74708,0x7ff9cac747182⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,18340344239877649666,5758788934619028075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fa070c9c9ab8d902ee4f3342d217275f
SHA1ac69818312a7eba53586295c5b04eefeb5c73903
SHA256245b396ed1accfae337f770d3757c932bc30a8fc8dd133b5cefe82242760c2c7
SHA512df92ca6d405d603ef5f07dbf9516d9e11e1fdc13610bb59e6d4712e55dd661f756c8515fc2c359c1db6b8b126e7f5a15886e643d93c012ef34a11041e02cc0dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0166a6cf-37be-49b7-8441-87425b0eb611.tmp
Filesize24KB
MD5917dedf44ae3675e549e7b7ffc2c8ccd
SHA1b7604eb16f0366e698943afbcf0c070d197271c0
SHA2569692162e8a88be0977395cc0704fe882b9a39b78bdfc9d579a8c961e15347a37
SHA5129628f7857eb88f8dceac00ffdcba2ed822fb9ebdada95e54224a0afc50bccd3e3d20c5abadbd20f61eba51dbf71c5c745b29309122d88b5cc6752a1dfc3be053
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5f24a7ec84405fe15eb00d2e04a3df243
SHA1654b4e1aa9aaff10e4c8d5f37115982e81a6dc8a
SHA256af1bba2b22f8fe6dcc9134091efa154ee02df6fe5bfcd4f3e41079f648fda0a0
SHA512f09c362e2b79b6e0a63cf98266251eeacdc6c19f3ad7d8a91aa55c2d1eb6a95747c3f5c7c59029860d3b55a40d774d4dc92b373e26d0afdfe078ab45a1c06151
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
947B
MD57d6c5d4274db442c578934e91387ab05
SHA13ac9d6f5492291ab614a190a5e2f84d67d3bf2cd
SHA256fc01c2c17c84bacb89241665d89b9e4a4d695151b398e952dcb8effd2a2ac262
SHA51246b985476b9feb9cafebe6bc17714ba4dc2818bbd03f68663f0707c7c357a7071da8c0701a72e7bb4faf77b88ee86f0e01d9f8475db6b4c26536a01a8c4b8e0f
-
Filesize
303B
MD572203c952e6fb9e8e3031bb30fa5a8c6
SHA14c5260bdfed95a8eb7457dc10d1379d8c8b94023
SHA25677852a408da0fcee487bdfa0eec715d4e3b436cee8878949cbb7034b4fad29f4
SHA51203d9fc5ddc7427901f3ee6cb8ed3957c06e11c990e7dba741cb7ada6f489b21ad33ceacf073a9aa2819b27f3194fa8ed9ec0ea58d9c6d14431eaab38093f8ac2
-
Filesize
978B
MD5422279a6496626d47428d5ef4dbdab8e
SHA12940d464b054f721759c1571feb081c48afbe9f3
SHA2568bdba0a57df3d40075a6d602614dec6897cde3ad0dd0a08e5eecf109e12b88fd
SHA512cced7e7f26ac5535e9747470edb375415e5309cab84eab9c1efc715960221fca841adac0ee610e04aa6c6c71f0698308e4ce5348b6b89398854957a6d9121bbf
-
Filesize
6KB
MD5f5ff3a482f946f5e51ec22e8ffdf3392
SHA1801d16d8ebdbb279625025be475fc01a78e71ff2
SHA256771404cf6090a0c14936231d1345c01bf6b6b907db7e70191df9c246649376be
SHA51225a0d6d57f9ea3b039dd48c075be55cf60b755c293b39e2dba088b5a1471b16f79e99e1a409f86a90c4d0070afed31c9077d365a2acfa0ed3852db77cd50a3df
-
Filesize
5KB
MD5660fb8b7f00f8ed5a14e3ed86c7ca8ec
SHA13fab3c9bb9b0bf30a8e0387a26be9e03b2c3cb93
SHA2567036506434acac721f0ddbf4582849b1d64f77507e8c7d6946616a9ca6b97f79
SHA5124946288c2ae0c96136f1c290ef3c5af159af37f8297fab0b59ca85931fb5f2432a2949fc1a180c45f0e1d7d2778ffac098ae8aed69dba115ce79ec0ea9337d65
-
Filesize
5KB
MD583ef66a693610ed2f9ca09a8c599939d
SHA1ac9eb18ab6823b6de51ab75608992e2f1f8e448c
SHA25621251e8d5797c198da24564fe63652b2fad5036db193d7f99a14f5221adf4d67
SHA512117fdc76817d27d017b761a2c0ab0d1ecae0424e4d45b106819c11f399b89037353b65c4cb6ffd96d714b1bb8089f978e41c9a9661cc7693b421062c8a1f0171
-
Filesize
204B
MD574c9b5e71e85d16dc839a51145ae5ed3
SHA1c1660312d96763873985aa1a6ca8155b8424718f
SHA256f204668d9feead1c438155c0c7fd3c83e790e56e2ee974c35fa1644e0a379b85
SHA51274b6c1a998bf9a6b5d2151ba15e3f34e6d907afa40b31238baf2d61600c7bfb41ce15ca93011c2545bb43e28aecb33bb9ee1141160b697946ec3a1f2e8c3ace6
-
Filesize
204B
MD5641b4a64a011359e86f9364d32a32cfa
SHA18ca945a010e237e0d2b9492a82514f565cece046
SHA256beafbfac9690906fa14e046e5ed390ccc071f7d19cbc71810d612173b87c5b84
SHA5129bd20d9ae41208f79b8f8b0e19d35c2e170fab97feee6b0360caafaa4fed05374740988589094845d109786a3c59f759eda1c9917e10b570fd21937d178359d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58b4fa4201eb487445723208b1bca1288
SHA1b9622d1013f21eae06c5a59737ecf08b877a9497
SHA25643431abe740923447d00f997a99c4463097d9b01fc60cdb179503051f5280378
SHA5128b6407c5a30af1af8886a14c756526aff97f96f1c13107add5c655b3415e8efe1e08abab293076cdc024847914b9fb0f68cae9be676edbdf4401085b33a968e6