Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 17:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://iid": 53929
Resource
win10v2004-20240226-en
General
-
Target
http://iid": 53929
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 544 msedge.exe 544 msedge.exe 3724 msedge.exe 3724 msedge.exe 3528 identity_helper.exe 3528 identity_helper.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3848 3724 msedge.exe 31 PID 3724 wrote to memory of 3848 3724 msedge.exe 31 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 3688 3724 msedge.exe 90 PID 3724 wrote to memory of 544 3724 msedge.exe 91 PID 3724 wrote to memory of 544 3724 msedge.exe 91 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92 PID 3724 wrote to memory of 4848 3724 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://iid": 539291⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff284846f8,0x7fff28484708,0x7fff284847182⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,3202294258836909773,1727396295177440377,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
6KB
MD500cbd6a54a21f5776ff71f9292266549
SHA12e3c0fb257640e787b502ccbf8277731a4bff7e5
SHA2567173ee46062d31105c1091f54adce1571f12756153a8f048e5e362006e3f3fc2
SHA5125c2ceadfecc24415db1de98463f7eea58f0a6f594eff0bdf610aa9892aebf80c72c13ae46c197892b8f38b4af5e20dbe3127187937d2605cff3a20c6b55274c2
-
Filesize
6KB
MD5a693fa8ff10ed82b7eda1329ed8a4fd0
SHA1dc7baf41dd6cd647a2099508671cbcbc1994bc61
SHA256c015f19ce5172e52ccde6711fefc2bfa7ee29b7283cdf12e565f6543e818fd27
SHA51269e6b0b1e994e21b2e838ad0375e9d305c1224a8f9c1f1d6992ae885512fa2c502cb87dcced0ee45332e0522e93247af9ae2352e4f79107ba4e8182ab78bff71
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fedba318b37f1d229adab2382d885065
SHA175ec0e7e9a4688d3b735827801a1e57bb90af9b3
SHA2560624c50dcd5c2d9991b3dcffbdf4b6c7d6a77a5285c3f364453404f8c83247f7
SHA51228b85945a50f52cdfe631a2409e65edd778479c7e485f537c6b99e8aac7aa2edd09176cc1fa75052c499ebf95cff75bbd77b12de2088ec14e1a6269902b3ea03