Analysis
-
max time kernel
41s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 17:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.google.com
Resource
win10v2004-20240221-en
General
-
Target
http://www.google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 2684 msedge.exe 2684 msedge.exe 2788 identity_helper.exe 2788 identity_helper.exe 2644 powershell.exe 2644 powershell.exe 2644 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2644 powershell.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2684 wrote to memory of 4480 2684 msedge.exe 77 PID 2684 wrote to memory of 4480 2684 msedge.exe 77 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 920 2684 msedge.exe 88 PID 2684 wrote to memory of 1804 2684 msedge.exe 87 PID 2684 wrote to memory of 1804 2684 msedge.exe 87 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89 PID 2684 wrote to memory of 1824 2684 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff917c746f8,0x7ff917c74708,0x7ff917c747182⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,2793313427139545004,8124926840103304358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Windows\system32\wininit.exe"C:\Windows\system32\wininit.exe"2⤵PID:5224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c0bfdc87389ee05bfd25a015ad83e3cc
SHA137dfa09a4af7a2e3fd8b1877b29895ffc66ec781
SHA2566911743c34cc357e53895511fa4e2eadd0fba88840f0b8c1bc248b60dffa1fe6
SHA5121277779771e665835a2bac05ed3785ace78294ea4539717d2d64b8325824f03f96c11a83b1fe6e7e47a8b21516492c8edf4e4af343c06ae52a168764df585173
-
Filesize
6KB
MD5d75a8cee986fed5b4534d95e8fc4cf61
SHA1143f5d39fc09b941726f2feef18c926c830cec5d
SHA256dd2ec0545f6244dbcbfcecfe70476c10e90c338069208d811ce3b97ae56d0211
SHA51227024b7922af1f385e14e4749b10780fce4e6300f1fff8a92dbdd0a71d2209b8597e65d55dc2181f2e36faee89259f1c9f0cc185562039d4fd8865cadb10c3e6
-
Filesize
6KB
MD5a87af30d5894a11a98c7f4109b4d2823
SHA14ff81b8e02a1670b53c9f1714de7b4d1272ea53e
SHA256942174a647aa2850d38b16ade5fa4761f39b617a82186bacbd560a229be89608
SHA512d7cdb4a2386323007d4c56b306273459559cc922d0f596bc308cbf6f48d81a796ed623b8922dcf9e3627ab556997bc7a0c186de5252d810cb20ddbd20420cb51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53daf23179bdfc681c167eec7d9d42183
SHA1abf86670afe94a7b185195ace3dae7f15dfe4c10
SHA25634e28df6bc1dd1727a9b115bcf641d6702d9c170adc92e287bf71c6663a1d724
SHA5128cc3ff7faf9df916057f1dff405c4a74599fad6c2428e738b6db84789053ee8c7a7542161fde5627b59f02d4e7e2f8d1e06183de8393dffb26fa39e15a10b69f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82