Resubmissions
31/05/2024, 06:38
240531-heedssab7v 131/05/2024, 06:35
240531-hchnfaah96 131/05/2024, 06:35
240531-hcelsaah89 131/05/2024, 06:35
240531-hcbvwsah86 130/05/2024, 03:56
240530-ehrxhsef37 1Analysis
-
max time kernel
1783s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 06:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20240508-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 4436 msedge.exe 4436 msedge.exe 1168 identity_helper.exe 1168 identity_helper.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 4268 4436 msedge.exe 82 PID 4436 wrote to memory of 4268 4436 msedge.exe 82 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 2260 4436 msedge.exe 83 PID 4436 wrote to memory of 1128 4436 msedge.exe 84 PID 4436 wrote to memory of 1128 4436 msedge.exe 84 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85 PID 4436 wrote to memory of 2892 4436 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0aba46f8,0x7fff0aba4708,0x7fff0aba47182⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2844 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,6330871428855253539,10032616549076789557,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5b15477969c12a6fec18be91ec54db771
SHA1c188644970f17ad72327993eef7af228f3669eaa
SHA256f1042e138f24d318b2c64e1650aa49cad8ec95ec6cfa8e8430b02cfbfcbf83ec
SHA5129267ab0247baba261c87367c4c21b613d3f5df4f80496000327794bf6a38b1afec5c72e72615a1c3c4721a826d519113a203993c7ca7cdb850efe6ab532ad029
-
Filesize
1KB
MD5cc0e22f0293ed7861056967e647a0e46
SHA198325ef89038a23fe90a9dd2b1ff773157cbea47
SHA256cf8499d22629974ecb05871f8391962fbbdf26c5c6c9877d137951848068ee57
SHA512b5d564a7dc1b2b5045b63c8073d89ba36a6e6406336bd47c19dd8ab5aa983dd55a3981228f717463f14b45e414e25949aa57da85dd06ec5c938231625ca0c0a2
-
Filesize
1KB
MD582499e4fe3b4c4b743c63ec5326ad4a7
SHA15aea24cc96b3c84b3a67cdcea78e7fcd89045847
SHA25664f0b3325b88f1e9c31448fb93b6332b37586a3edbbe6b087b58f5f4bdd63596
SHA51280be49aa6602cd1dc45b892aac83a32baeb1d4085bfd4d89391bbce8defe4c163cb4a6074c8f04ff1451b2ae9cddd703eed0a0f62592626e30de1aabfa7578c0
-
Filesize
5KB
MD57896d8fc6bf0e0be1c68b3977bd57165
SHA1b4499d89701bf45c67a6d94e1f389d1bece5cb4d
SHA256e83b7fc79934dfa4c951c2e457e3d8ca348584a66ee1abc05b3210e893d98425
SHA5126b402797600b8c5cd01d0e47a866aa9c8b188d24615b46077b9fbd21ac8876b6078dc257c37c68de8588454ce2287b13d902a38fc90ab342203b71d8d22ea799
-
Filesize
6KB
MD5d6b180324406d4cd22252136d4b6bdaf
SHA1338d36787cb374c5de258e4d42ea3ab3df383265
SHA2565a7ec1600ca33a1af31264de0d0cb828decd14b3bebb8e53b54da4a8938f427a
SHA512020f982e356cd27b536f4366d969328d1b2711b01fe93e9a1526cb0c6644af8f396de54c7c68033777d1aac836da29e1f178e808a34e77a76c34433da4417954
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f158b8ca1a68b871f96d211066044163
SHA11df0e408ba056b9c71035054cc56525a9191233f
SHA2561daaff513a53e43b01791f1de3f716e3f5f8f50944693bb8a025aa6323457df0
SHA512054dfbd57393ebf723e082e014ad25b86f827f6ce2c28eb26ca6c33993b9d070519c7d52ede5cab2e7ad6c124526b84f5c5ddc220443c4696dbc0a9b4b61a6ef