Analysis
-
max time kernel
482s -
max time network
490s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 04:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.ca/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.google.ca/
Resource
win10v2004-20231215-en
General
-
Target
https://www.google.ca/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 1492 msedge.exe 1492 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1528 1492 msedge.exe 83 PID 1492 wrote to memory of 1528 1492 msedge.exe 83 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 2840 1492 msedge.exe 85 PID 1492 wrote to memory of 3268 1492 msedge.exe 84 PID 1492 wrote to memory of 3268 1492 msedge.exe 84 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86 PID 1492 wrote to memory of 4372 1492 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.ca/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9871946f8,0x7ff987194708,0x7ff9871947182⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11719857043384050732,10732959502244913042,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c25f9d0b70712705872110f5cb7829e4
SHA1c030f3d140721d86506aa82189bc51e52773341d
SHA2566875e28a0ec3a0466c3436e61c80cc0db5a62932a0241dee9ec4a4f216a48ca9
SHA512a3f94036353247bb2af88f4cce528028b0bff7e2f530fb2600efacef6cf3c867fa5116246bc84ddc2ea0e660e9b3b311e267e3847568b7ff7a8a968436f5b37e
-
Filesize
1007B
MD5b10b0e0a607740efa36361dd1224eee9
SHA1be1e48f14ca776b0a5ac917fd767957a5e0bf0db
SHA256d8f9ce3a9ebd4bc4dcc10ab44e58354defb6cc9c911f32775aa636315eb1b7df
SHA512e41d317058603ad0d38c06a10fb48197a5413868ec5945f583c9d2165be0db9dd783e0e5015d077299c9514b5ec965a6cccfc30b953751afc49b35100367f565
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5cb3d122a68e3f7bd683e116d8f7d61cd
SHA1e62ae97dcc2c72eb532356e07d3588170b20c767
SHA256e41e85204a61e4881eca987dfc07d714fa2e62a4ce3d69cd616d3138c1342481
SHA512b9dac9b92cd9f1e6cfa6b40730f6b6360f34577dba1d51c5812d21a72efd23a4f47ac0dfb90c7dae94b4880af1721b48a1e3d5c260233915a3f24321d5a35379
-
Filesize
5KB
MD548faf50af08dfa4f20eeaee83285dc1b
SHA1acdf4f03f552a9df554173232b1f782b899a7753
SHA256f44721d075ab2af394954be9e0d3dd6426e19e1c8fc72e50846b6047dd930213
SHA512f0b54d99003c8bd2ce0c8eff376f7da64b72059d65b857165acb521e75f396ea339823b307db496cfbae590e5ac1a81131da6665057040761090508964768361
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c28d49ff040775f3f599a7d64c385d7b
SHA176f568a7ce2bec34f875c9a95f4ebd1d52c77380
SHA256892d1339b858d2bbd6fd61ed695781c072c72c3a6bbaa43c5e600aefa2fb8f87
SHA512cf5d2067f372fba9cbde81f15449682fef86f6adeac4c10843cf63f8dad8697e3f4167f6cb74808c1e8e43f4a4a988965b372e5e390bdba8ffe03be677c8d339