Analysis
-
max time kernel
21s -
max time network
14s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/05/2024, 12:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://a
Resource
win11-20240419-en
General
-
Target
http://a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 4424 msedge.exe 4424 msedge.exe 4612 msedge.exe 4612 msedge.exe 3500 identity_helper.exe 3500 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2292 4424 msedge.exe 78 PID 4424 wrote to memory of 2292 4424 msedge.exe 78 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 3584 4424 msedge.exe 79 PID 4424 wrote to memory of 2596 4424 msedge.exe 80 PID 4424 wrote to memory of 2596 4424 msedge.exe 80 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81 PID 4424 wrote to memory of 2212 4424 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://a1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffac0723cb8,0x7ffac0723cc8,0x7ffac0723cd82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,16056005042537840386,13156145681977051812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58d5e555f6429eb64461265a024abf016
SHA105a5dca6408d473d82fe45ebc8e4843653ad55af
SHA2560344fd65882ba51695a10e1312e65f08d58afca83771c9d545e181829d6b5ed1
SHA512be5edfdcda1ba0db9fbab48ee1b643f1b03821e24048892d18033094fec14171035179e987a08dd91a1c25d91d9256837a4105f6765afd225a868f3e95050b8f
-
Filesize
152B
MD5b5710c39b3d1cd6dd0e5d30fbe1146d6
SHA1bf018f8a3e87605bfeca89d5a71776bfc8de0b47
SHA256770d04df1484883a18accb258ecfa407d328c32c0ccbd8866c1203c5dfb4981f
SHA5120f868e4ce284984662d8f0ff6e76f1a53e074a7223122a75efa7bb90d0204bc59bee4b36c215d219a03707c642e13f5efce0c3c57f46659a0cb1e7fd2f4d3cf1
-
Filesize
5KB
MD5f087b366deb7793a8e65cc7c526e8358
SHA11fc3a6b461e5c59bb55ab4a8f3302f75474502f8
SHA25666e472fbd21531abeb58239ea40fc04743b42034925f1de9aaed81de3fc25a26
SHA5121bb437e4919946a419791869a88cd62a023aac0e8ef55d394007cbe3fad85d3dc84f00ab501b10671724d5009cb9f72f9e31f1b9aca34ff09955ac1555bff89c
-
Filesize
5KB
MD5c8c682fb201540e05637b445ab4499ec
SHA128d853dbbb783af9b5202a1aa003346e3697bc31
SHA256d6abf3bf9574182c5d9779884924f4102ade2e64bdd956e2c367463f7517f633
SHA5126795ddc7f8cedfb38d148665b29cfb36a9ab352b3c6fd3533a99a261331478fd33e5a4c645158b544843d29df3e60154e328157a5ed1c3e4856cb165f1177c63
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55c7e75975dd84120330ec2691b0ccb2b
SHA12b37a7aed1cfd5df6f719afb1a73ab4a17dfb255
SHA256e2c031b439f3e63226adfeaeae38bb1b35dc7d4dea72fca8232ebb6c8de0c44b
SHA5129e5e99ea97dddbcb97ecbab70c3289a815d37dbbc941ee8125c233c487f8833b4caf9131cb1072781084d6adb1d355015b02632be363c01425f351e28c62d95b