Analysis
-
max time kernel
1717s -
max time network
1690s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 12:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
http://google.com
Resource
win11-20240214-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1940 msedge.exe 1940 msedge.exe 864 identity_helper.exe 864 identity_helper.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4936 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2168 1512 msedge.exe 84 PID 1512 wrote to memory of 2168 1512 msedge.exe 84 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 3732 1512 msedge.exe 85 PID 1512 wrote to memory of 1940 1512 msedge.exe 86 PID 1512 wrote to memory of 1940 1512 msedge.exe 86 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87 PID 1512 wrote to memory of 3152 1512 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff859bb46f8,0x7ff859bb4708,0x7ff859bb47182⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10087496629251923561,5954096154483269604,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
Filesize
194KB
MD5ac84f1282f8542dee07f8a1af421f2a7
SHA1261885284826281a99ff982428a765be30de9029
SHA256193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0
SHA5129f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD552269e1f7088bdd0020b78b1de9ec7ba
SHA1c04d87ef39e795276465c12c9c451dad3a758616
SHA256c0c109d6819579343c2a18b8904a07ec173337b17e3542d3848229e928f5e184
SHA512423ad21ceac3b0aaec050fbdc4644c18fb7999ab0fd380079b8ed12258884c3b990d82e8d6dc38475886d982d1fc52f52899f97bee3d930871b4268d2ba46254
-
Filesize
814B
MD5c45c92937377fc8f79a031b4d5792ca5
SHA1fb5f92a94502bc48ca35e9593a48fe33f0679388
SHA256f1327b03066ae044c985d1fef6ef4278bc23ec52aef4385ecaff66847b1a19ef
SHA51266f05b26f35f068286885c91caf52c1618f57150fb8b2c9617498e086a088eaae8445ede37dcc5bf8aba3eaa7f605f3ac01417f35717b5b7c450d3aa25428292
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD59d5614473aafeeac582be613613b9b58
SHA10ceabb0db73e3d5c78ac641194b01f55dabd8e42
SHA2564ed8135624a6677772b34bbf2bc98bfa3d496226305ed99381f3c327e959d483
SHA5123151437a87855c56fb22c0181abadbea66a7927017a4a5d91b38e2e9fd6a58229f86e9d11b7869e987047d6d1ddcdea0663f1874e4de7adbc5631841d1a5c2cc
-
Filesize
5KB
MD546284b8fc7a02eb6ef8bac4840d966ff
SHA14cd5dcc9e59b4096d4b25a64a0d4f381ef368dce
SHA25602422268998cd87d8a80599a35ddc2b9147d1b613e96d0422eb076c2596901fc
SHA51285efcb608d0b1cab22a1742e66a26b51f47faa5f6b394edca194c07b0ee8a0f9856e537e43b0fc48508e3470764a273af637af67801099d5fbfd18a63757e272
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55c276e5c6dbc359f3be37181db0742af
SHA11819d34ecd3daa908dcd02e424e2c5b34bac96e6
SHA25638812489ee14c0132e2cbe59937d3070291502c40f8434341307e51f845b68a6
SHA51277a6f17d0a13a5adf503e6b20bcdb41a581b766e6c3dd5d49ef69604218c3b39fe1fef43af71c4abe812d9cd9864498634dd145c8b9e34d270dfdd2a1680a79c