Analysis
-
max time kernel
188s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 12:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.hybrid-analysis.com/feed?json
Resource
win10v2004-20240226-en
General
-
Target
https://www.hybrid-analysis.com/feed?json
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 2660 msedge.exe 2660 msedge.exe 2136 identity_helper.exe 2136 identity_helper.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 4172 2660 msedge.exe 84 PID 2660 wrote to memory of 4172 2660 msedge.exe 84 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 2112 2660 msedge.exe 85 PID 2660 wrote to memory of 4844 2660 msedge.exe 86 PID 2660 wrote to memory of 4844 2660 msedge.exe 86 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87 PID 2660 wrote to memory of 1524 2660 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.hybrid-analysis.com/feed?json1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96f6b46f8,0x7ff96f6b4708,0x7ff96f6b47182⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16343010959394955137,16353211966002574465,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
191B
MD58e9788a644e235e1a76f40bc09a77667
SHA17d4d46972b3c3b4612bc8d04c52a3e11cc16dfdf
SHA25698c6978ad381f77905100ff332f77b917d10d0afc8dd968be83a695ecf2ccf45
SHA512a7584319177327b8a8b650be442697a2121328d56a0bf6a74b0751540dc80176d8d6bd2cbe380f89d345fe2e38e98dcb5195de480e106979ed19c94cf25269d0
-
Filesize
6KB
MD54544f9bf3f5b749b961439e51781a148
SHA161c31545022105d2a3d560f16dda337ecdb8643b
SHA25638b7c33f16c7a387591795df1b6bc5756702ee3b37c430c26aa247c2f2fb3817
SHA5120a1ef22803b73874cae00840f97b4fc1cbe4dd1660261fbd9a7e28f5de3c7ff890fcb3d2e79251f36dfdd8c657a17e59d680a9450d199d3d53825ba89063803b
-
Filesize
6KB
MD5c24651b4a624bb579c2bd4a6c83e90fd
SHA1e988aae3a1560f61466ba5c883e7b481178b9f74
SHA256496b40cfb8b5cf73bc74d0ed743ac8c3fd485ca489c50df5308a6efba55a53d6
SHA5125feedbcb06bdf675b4b83bd09019b4261b072f51a36070acac212f2872b037e6b230c336cbcddf8cfc5fe539818672881c97c356d88409e49f2f2b380f1ebee6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD575332e82dc4b7aeb61d95218706ffad1
SHA1513d9e80028910f9ebbee04a5fb96508831f6a80
SHA2563e3422f7422d13c6b7aef5cf6379c383b9e2a55d6be779489854c5723f8e335b
SHA5127e28477c1745aac6a74c43e174bc7b37c3d40f851f13c5457452f5916c21cc3eca3e5a7c65099cd1a74c972e3299e327e8814d18d671ad31f85cf97bb2487234