Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 07:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://paste.ee/I
Resource
win10v2004-20240426-en
General
-
Target
https://paste.ee/I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3936 msedge.exe 3936 msedge.exe 4436 identity_helper.exe 4436 identity_helper.exe 5472 msedge.exe 5472 msedge.exe 5472 msedge.exe 5472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3936 wrote to memory of 3980 3936 msedge.exe 84 PID 3936 wrote to memory of 3980 3936 msedge.exe 84 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3460 3936 msedge.exe 85 PID 3936 wrote to memory of 3444 3936 msedge.exe 86 PID 3936 wrote to memory of 3444 3936 msedge.exe 86 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87 PID 3936 wrote to memory of 4820 3936 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://paste.ee/I1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16842865969184311705,14586867959857187777,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\91e1a066-c46e-4380-827f-b98716e76fb2.tmp
Filesize6KB
MD55b8e0365ebaf3a3bc5cb0781b1872eab
SHA1319fec80c67143174daca064f95979c5ae4db45a
SHA256caf3d653ccc93a8983dc064ca3e585fdb3499427d8d999a89ad6e2448522b64f
SHA512aa311d83a68a83c009a51acba7fa37e4430dc000ce517ab631fe2b249487127aff4e071fffb2eb43e83fc7293b274fa3b245884a3a75d65df3de0e697e862047
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52be6de7875697c639daa7b13440f3f54
SHA1f6597cd2ff8ad35fccdced394b00df0c5a86972e
SHA2566911965f9da344246d7c9a60e68e1516b6f6e53d36934ab012c94d8a1c13aab7
SHA5127bdb80896b0c4470d0badb6e884396b6c6cb5eeffc10c020fd35ae8f302bd8e6f23289f7353efe99a280963fe909fe1e5dda7d02b45fd41bb98dc654ce78b683
-
Filesize
662B
MD518f34c5de8d6626ef2645462d6a6c657
SHA111e1b8d6d1b661e0861fad54c215ce1c5a3dde25
SHA256f3653548a4486ace135a444ce6ffa9653a797101ca74343c95fa258fa41def5d
SHA51207164df1794c34b5355124728356cb416201d43a52cc3d23559c8d174265076209d2654e755483c61a390c2e0a7d08106086f2454f6c320e21209adf3031f3b6
-
Filesize
6KB
MD52fbc6475574d236ea2611fe0982bd261
SHA14c913c370a4c47d0f72613c792ddb385b4709fb0
SHA256e09fdab76c460771f6fcc83801d8db4a349250758fa7b500389010cf94dc825b
SHA512a8be9a87aebb635595926ff2dec75cbce33cbba21037fbbef2977881ea13b6a871bf2db5ec1dd9e6993ee96d2b0aff7673e39e2179bad618726e2b05a3f1ee9e
-
Filesize
5KB
MD539c6c8d76bfe4ead51204527ed26c075
SHA1b3aef505192d91faa735c7ff9d0d7489d69ec7d4
SHA2568fe172aa34482fbc2038b92d7381b14a077785f73b42fdb2dadc1386e759d584
SHA51264deabe113cea7aaee1ef90910cb16ceca472924a04a1dac4f5b8e969a13ddc555f8240f6049a62438262a393e9d231e23e4172a63c1d4ddd8a4b0810af8bd6e
-
Filesize
372B
MD531108142199dbf90e3333112ebf8e550
SHA1616753357cdb9ac8b956c8c342be7f47e65d108b
SHA256728b6b6586a87c973aa7563cd7b72da9d73c97f2b89a1594958f433ea2455a1f
SHA51293a59da74929678a0e1bd34f8d0d11b2cf933e3968afbc524c29e5152fa2a343bea774589c1413a71d3d6656d8bebed8e7ba67f0373ac6107f942132a801b37c
-
Filesize
372B
MD5f329a0fde29f417cfa96f9940a53da3d
SHA1f50b8ae143c13a260d1b48b58a8e6c8921d6ea10
SHA256a14b6abfaf3585ceec711af2da55610b9f487bbbda4faca0aa03f0286e173623
SHA512f67d2484b9f146e2dddb850f73525359e080158d2f5e3fc03c22fe4588c1d7bf7f7540297aee56c419e759cdf575754f4025d88a3b55761d8ac2fb2e37078083
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD550b5d23ef500c67c355531bcd12c519e
SHA14561da5c779ba96a8a0b932c140e43e4c7d7d004
SHA2563cdba33e8d3ce84e65bb3fd6932f7c6537b46e8671da00de46333ce50eb039c3
SHA5122aa52ac6243ecf84849bee2b767db236e9f8da97581172c81ef87ff2979320b8d35794f3bba2d2734a86d94a838347463260a1eea42f1b52380f4375252b6afe