Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 18:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://s.namemc.com/i/dfe17f477a98c144.png
Resource
win10v2004-20240226-en
General
-
Target
https://s.namemc.com/i/dfe17f477a98c144.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 1656 msedge.exe 1656 msedge.exe 2060 identity_helper.exe 2060 identity_helper.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2588 1656 msedge.exe 85 PID 1656 wrote to memory of 2588 1656 msedge.exe 85 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 4744 1656 msedge.exe 86 PID 1656 wrote to memory of 2224 1656 msedge.exe 87 PID 1656 wrote to memory of 2224 1656 msedge.exe 87 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88 PID 1656 wrote to memory of 3028 1656 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://s.namemc.com/i/dfe17f477a98c144.png1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacec146f8,0x7ffacec14708,0x7ffacec147182⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,731215527243800103,17712194282045093810,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
180B
MD5082c63efc87e0df421ff809d1d8e5e68
SHA1b530ac31d4d7926e48eae68df5f5ce31c43d81df
SHA25634d7ed5087121329ee0c04659d5504c9cf4958bd28965d279079670b4667041b
SHA512b91eb21a6c1ad791e95f878d6e66029f77a056a185ac1895bd17e08048bf005e7ea70276dcef5d16bdc2d47bd42c0484f493b5b2a967b444bfc07a87984e2ce5
-
Filesize
6KB
MD5094a2397a3412af568b774996f0ac0c0
SHA179e2ba1a163b4ad6b05ba85401d1cd7fd04f7545
SHA256591dce67187f5ff8a11518cf8f797078a757ad68ba4ccd0e0408500765c04331
SHA512659995060bdfbdd77844371234505c8f21bf23476a9692003a0f634fdc2e5073a375b3f6a93748e8340d8f41e8a8949753c2c21d62ad885a49f57439563e93b8
-
Filesize
6KB
MD5168cafb334b7c6046820ea7d318f64c1
SHA13aff8ce2922c9252a8d57e82596b0c9c82833111
SHA25606fce9c8985341b82bc0f871fb8683b4f5ab28d8d57808f60d339a0ab324e42c
SHA5120d73a7a00d65b7360cc8974499746d8b82f44187720a398128c2a5249e71db10c73e98f00e24f51c856008c22b7673f302c70f33e177e84cc21a6cfce217cc7d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f2cfdad06c11f978134bf5bcfa95420d
SHA15113106e0a892b8c5a9689a749804e9b411a1da5
SHA2569dec16502991ddf6306a61abfe02a4618bac21c05014af14f3451236a40550a7
SHA512b877bd776c2ae28a97d9c8062b84afc832797e7cb51eb62a9f8a26d6110117cab85267da594fefbf6e00188bbad9e4ca33e5bd2e88467e348de4d2ecdd75935e