Analysis
-
max time kernel
388s -
max time network
386s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 13:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.hybrid-analysis.com/map
Resource
win10v2004-20240226-en
General
-
Target
https://www.hybrid-analysis.com/map
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 1904 msedge.exe 1904 msedge.exe 3980 identity_helper.exe 3980 identity_helper.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2384 1904 msedge.exe 85 PID 1904 wrote to memory of 2384 1904 msedge.exe 85 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 1912 1904 msedge.exe 86 PID 1904 wrote to memory of 4736 1904 msedge.exe 87 PID 1904 wrote to memory of 4736 1904 msedge.exe 87 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88 PID 1904 wrote to memory of 1960 1904 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.hybrid-analysis.com/map1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf5c646f8,0x7ffcf5c64708,0x7ffcf5c647182⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1837912226673952419,13513388809252819355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
Filesize
11KB
MD578a70743425b879dee5891eefbfa9965
SHA1fe1b62b4f9d5dcebe0bf596ae7fe0d16e1ae1467
SHA256bbe1e1c8ad0b59a0d64eb1ca29f5f43b944ef78aa88aebd35e2652369a2eb739
SHA51284cf1da123c29b7c150426a62f7721b118dfe02ad2703df784de247a3bbb172b0cb4c1b9198e49622f4d3750ee833b9d504c4f6ccedad158e1617a6aac95e081
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD53cfe95244b27eed54addf0e85d3be4ed
SHA1131021468051e01e0d49d4334300a8ac46cd60f5
SHA25675a286fe19ba40c7f35309b94c566c3602781b7a995539282dcdc26a97044519
SHA512f62130c86ce0358207a62a0d7899058699f7c809ebdc73628cf9e5457724e1bc7a91d7c8ade92f4ae9519a11e5fa067c2e2f69500be07fa5faa49a2ccf367a41
-
Filesize
191B
MD56c140558881ef48e24486b95350e18ca
SHA1a098d5e26bc98bbfe7b1dbe84e1f025a19dfdaa1
SHA2561b71d2212563ee34ef2e2b7232f53d2701fbf6e32eb38d3a43fa6af1279904d0
SHA51273110a1115a74c0992b2bc19cc49a8520d5fe7e89f03efb447070528da0e43069f86d9fe3b36eb32347fbd3f86ea5724f92b159667d13134e3ff2931db0602f0
-
Filesize
6KB
MD5537b5c2809bbe678fa8e657f48e61a22
SHA1d712415fa12e1f4331344f33d816a4638ec9b007
SHA2561fa07282af3768d1c6287476114ec62fa4498fc9218d839355f03e048c5f8385
SHA5121bfd46513d7f369bc25ad3a097878b4b239471692598896b590f964457e9188cb8e172cf56cca058b4f1a8fccc1ae49dfbba11a977ee4a39c64dd7ad15722e9a
-
Filesize
6KB
MD546717547e48b881eda7d2588656c380b
SHA115f079cc540a74521b8d444f218ffbab2b1652e8
SHA25603d7a558bbd577a8433b756d120e45df677598d7d925646d38880283e9687bf7
SHA512010c4af6f0a3b8b30cff7bfa015561a54d896a901b5c8f6bc5d2a5ad272552622b710df64fc26b25ab6f5251696b42eecf7d8e1c7a43c69ee9932563374be30c
-
Filesize
704B
MD5945723ad186446d0957d0e2c6d191e49
SHA15303b56c61467ed0b98002654b94c399efcf7117
SHA2569e316dadba3b6469c0854dc138a28ee8c93ca0ce33e36aebb4edb9608c5b97c3
SHA512b95af63df15e331e7114e9bfb5e58d1384484f6d17c9cfbaecbff085016e4578e48e301caa070c4a7756c7e961f72376baabeabc905b78ad0a99d27afd0afbd0
-
Filesize
704B
MD52f608e115a97cfbc78b3ad576627ab4b
SHA1832825b94144d6c823a42f54e827e4c84e27864d
SHA256dbd0e3ecaf52cfbfcf8a94b0e37429d64023a1f87bd370cdc20ac4aafef0592a
SHA5120c03addaac965bd05a8b10551cbf46a9f3be7ae3662509986a189dab463e485d2fda09a7714e0db50409fb9dd63756320758dc9b8c012118c41a700b8e8619fd
-
Filesize
704B
MD5e7146755d3a1fc7885891aac03d2f611
SHA163a27661d51ced25185a529f533b0908e6a84146
SHA2565e024d1cb50f190e3ccad4ffbdcebd804ed9d03c696bac5eb86bfcd9a47fe914
SHA512ed50e6fe5939aecd394744021055140299f4c14f4052cc362adef0ad1e6a627c8db8ae32bf77784c6003020be91939ce928fc95e55510efa64f9fe10bb98ff7b
-
Filesize
704B
MD59b95caab16685d13112668e01bdb5fe3
SHA1ea3639ae4798cd1e4159eacf083c8e7e02575b61
SHA256aef1753a3ac347e41ee89e2445f8e677d71cad5061458982b5e4ebc3472a86f6
SHA5127dfa5cae859a189c0091d627ee80e58806a795de715eab2148863d1a35658505eef03709e5634ce13635fc5f0ef18af806b48dbe8272fb687c6eeb2003f3a1a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389