Analysis
-
max time kernel
106s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.microsoft.com/fwlink/?LinkId=525921
Resource
win10v2004-20240426-en
General
-
Target
https://go.microsoft.com/fwlink/?LinkId=525921
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 3596 msedge.exe 3596 msedge.exe 1124 msedge.exe 1124 msedge.exe 3348 identity_helper.exe 3348 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1124 wrote to memory of 2756 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2756 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 2144 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3596 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3596 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe PID 1124 wrote to memory of 3644 1124 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?LinkId=5259211⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc030346f8,0x7ffc03034708,0x7ffc030347182⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4168 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12027473402141881362,10505539114259195504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:5396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize864B
MD5d27fadfe7fc1526b5a018ec1ac17cf22
SHA144b1af2f7739f26a3bc568c93f980fe2b1fbe742
SHA25695ef1e430dca281a07e872636b8feca2f3fa2714cbfb440e2a8278292198d5a7
SHA5122ddb8016ae2ce77ea6dc526b8b8ca2e0e79d378d4849dc30e34f4fba06a68d3e738b35e16ff5818b66a91bffc1b0a869f01f6a78cfcf5b8717bc61b4a50464c0
-
Filesize
1KB
MD579abc414663c3dfcf406155fb8f028d5
SHA1a8b88e91c5f68a6cc62b7fa2b1072bfa748a3771
SHA2568d675cb019f16d90f49d5b4fbbaec1f1e7c8c4e91f85e4716db2bbda87520904
SHA5121fddc1efd8715b97ae34aa466856d9bd112310628adbdd9e6f8412107ef5ce429bd6dd98b5393521d88f9c53690763b018d5c830cf0be22cd0b5669bc7d897fd
-
Filesize
6KB
MD597b68f24b71a5a16b89db61c4596dcb4
SHA11d0916b8b9795c35f447f77247640d9380a149cb
SHA2561e4f86c6687b5383ed66caa519da87dad33015fd2b2df57e62e41caaaf614208
SHA51228c3153dea5bc8b2b8c4e372123ecdd419171fd50775ae0f9cdb35851d2f88ab3556f3bc550b500162f073f025d9f62d3aab48fe583731f6cea76a91fca2f052
-
Filesize
5KB
MD532e62f95ba231ff75e1a9675284572e7
SHA1abdec32250ebb3248f5ea18c12ad9add85ddf63c
SHA2563601c952a729c4cb8fd3c0866c8a2b91a1c202f76bf28c4e4f6b46d97dbce72f
SHA51219ba882baeb453cb100464cc3419e4798f8e8d153a2e8138c0b4e8d0718cc7f8a6b8657da26e2a064f0bb41426bb21e5cbce2cea2a85f9758fb698a370dc7056
-
Filesize
1KB
MD5f96e018eddf437c509f51101d419555c
SHA1783f356c8c99aeb386c63b5326bac4e5c3a6ea38
SHA256e9ca61b65a52be2f79c3ab30c6e231263c426ae31f834737fe2789719e38ce03
SHA512771bd7b4273c40ba354bcf6a2988275f579732fcfc28059188dd4c3f1713f6271980e208374ba27ae18a9df3fd5878df841c1e5ec3bb60801be055451d34b3df
-
Filesize
1KB
MD507efbab77f1ce95c717f0786542a588d
SHA1d0b4c76b99f3801821ba35ea3d60a83702a740b7
SHA2567cecebc6362185b77d98c374def2f41e58ddc96570831e9ff5a5f92c7b8f7568
SHA512330d27cc9b3d1e3935747098e3d4fbb9daf42c968049bffa819f11c5c93c4e32ee971dd35127d4dc9277e7f9e3f7bd00d63b2119fa1cff123975a058d73c6e0a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5bc124b8465b6d04290f90a67194a6359
SHA1e99ca30dafcfea62ffb15e209a741fdc45e0a3dc
SHA25624ae7502d149b8fef7ab80a1530de0b3560800e305d3cafe988b5ac687903682
SHA512244fea9daa281506ee79479aee52841833457cea9e0b2bdae76a4ce622e8c192929542482d2912ff2f4cf17eeff6127d8f0d64165443bc8dab6f70e86ee14496
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e