Resubmissions
31-05-2024 06:38
240531-heedssab7v 131-05-2024 06:35
240531-hchnfaah96 131-05-2024 06:35
240531-hcelsaah89 131-05-2024 06:35
240531-hcbvwsah86 130-05-2024 03:56
240530-ehrxhsef37 1Analysis
-
max time kernel
1680s -
max time network
1686s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 06:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20240426-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 3912 msedge.exe 3912 msedge.exe 4612 identity_helper.exe 4612 identity_helper.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 2052 3912 msedge.exe 84 PID 3912 wrote to memory of 2052 3912 msedge.exe 84 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 3532 3912 msedge.exe 85 PID 3912 wrote to memory of 4008 3912 msedge.exe 86 PID 3912 wrote to memory of 4008 3912 msedge.exe 86 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87 PID 3912 wrote to memory of 736 3912 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3e46f8,0x7ffe5a3e4708,0x7ffe5a3e47182⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,7406794817795197262,2192191582624034923,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5af1fcfe1f8d4d29990e8bf8917d15578
SHA18fe7df2bd6f83d364a485ccb297939dfbe7b116a
SHA256058e870be47cd9406f281d5d23939231b14cee9f6a25da76e0c2019b95c070a0
SHA51292759cc6f193d4850d9b79b6edaed1c84e8e1e5064c2884e07f19ab4fbf5bc13d7718a5a4ce523b4e5a2ae46af870c0a83c4ba40abc0bf905dceaa35c9d56946
-
Filesize
1KB
MD53317ad53d1c7ee7f68ef41245c497ba6
SHA1d28bb2cb7a52fbd946b6c42f9335e2ac2d667ea1
SHA256370fc378b56f2a7c086b9e73ea1684526bb8ebc7acfb67a147921a448a374703
SHA512ffbc1da1d8146af4fc1f6195054c64c7e22fb8091eca521b55b7080ce0dda72b0e78c4c72ea398506f81d7da484012d6f2b0136e2ff54c1e2ba026e9bbb9d791
-
Filesize
1KB
MD51b663db175c14591aeff52404e595f78
SHA1b2cd08be48a667f287e62c9495ed36aa7d04c037
SHA2565de52ce62e4161554427248dc33f570c3f3e2934d1a4f5ef8a03b87cd197e348
SHA512b0e5eda0cd236eea7191919f44c1857852bd4349dc503c6b0baf4a2b96c2bf3a9e6b85347203a47dfb5b367cf4f698090951e7bf9067af566ee1ce373cc0f9ed
-
Filesize
6KB
MD5dcff4b4ad204ea43630301b7f90e524c
SHA142b6bd5c4af5a1b0a6597d984705dc34d4a8f76d
SHA256aa20dc57ecaeabe766bc480dc527b490014b3aa3bbc81c8b1391cef18a0b7a41
SHA51229404c9551954dab8f3e77db4e9ea299eb3b57299e4833297af51fa41acbd5ce9b7300682f26eb1f443aa52430d44738fdbc738234c686cf99e4ac22a4ffa246
-
Filesize
6KB
MD585578953afd6248da96b5e7267816314
SHA1f4cc1ca39d05134c9b6dbb401b9895f2a7701b64
SHA256007557d5345875dfc1123d17d3713a157f440187dc971e1a88e05e061fdd8ac1
SHA5126102974e71dd2bc269a2c774e98f0e87683341f6810c49144b8ee4bedae62ed9e3d9aac47541df9f39864f612c513e9b184c75531d0801b8edfd2fb201442d2b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e8748a7235973dc2643c175e1da108cc
SHA18ffea00e824dff3251bcd10c55f73c032d964a6a
SHA2564d0ec7e739f7f57ccaf40c12efa8e3dbeff8e92e70fb42bd10937440fa538b5e
SHA5129312a36e1f84e9471983d5d4f14652e00b995b5ab349026d61ae49de97e11af8ca8d18d53a17d9acdf5aeefefdadca9678adc9761055739c398188c89470a4df