Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 18:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://res.cdn.office.net/assets/mail/file-icon/png/pdf_16x16.png
Resource
win10v2004-20240426-en
General
-
Target
https://res.cdn.office.net/assets/mail/file-icon/png/pdf_16x16.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 3196 msedge.exe 3196 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 1204 3196 msedge.exe 82 PID 3196 wrote to memory of 1204 3196 msedge.exe 82 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 920 3196 msedge.exe 83 PID 3196 wrote to memory of 1488 3196 msedge.exe 84 PID 3196 wrote to memory of 1488 3196 msedge.exe 84 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85 PID 3196 wrote to memory of 2676 3196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://res.cdn.office.net/assets/mail/file-icon/png/pdf_16x16.png1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7e6746f8,0x7ffd7e674708,0x7ffd7e6747182⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,2414531656568841709,16623759932335880939,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
274B
MD5fccafff39cabc85606aa9de04658ba6a
SHA1f4143ed71311a60f1539cb9b105a5a5ab7e05f56
SHA2569359284b391145d67f32615776a184d77383964ad23d17386daa25d953a65340
SHA5124691d0e80ee42ce372ae820e4a61139961e40859bbe7bb6519f4b354885bb713eb8fcbf1611e0a6662f8a5b55f3223b4fa8cd352f58d755f6d2819d424c07aae
-
Filesize
5KB
MD5344efba9de71f48cfad103c5a27dfcb8
SHA1795b645a158aaea98f688fba0b5ec2750bf9d4b1
SHA25610de874519f555d311f3df0a4f2d0f7004adac14b124e53862a7539d643a4ea8
SHA512df02e6d9ed0792c75c860385a587d60eb08ed60ad7f538d0b0b88e50e6419277fdab4b3d5059fa0091fac6aa157b3418aaee1ca657881e4606ca21e69f3cbef5
-
Filesize
6KB
MD550724d13ea813bc11db1a3bbfaf1d5c8
SHA10d53ed80934e90539deef3cea8e89be48b2eb0c3
SHA25638f5b5cd388996687c7ffde0869bde6107c4821d74eecddfb8c529b6cef7ebbf
SHA512a88c871d5e2384913dc3fbc3314133539d3f4a9bf5f0d603e19ecd0e1ae8a6618dc68bb3fb4a90ade96dc5f45fcbd51fee31b61c699a635ed88ac3e12935c335
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bcca5faf69b8151e4ce4f139a1fe084c
SHA147fdd2ff22e858ea59f346a71f241b2272506b3e
SHA25679930267e04276280f7611b01bbf6dcbcb3543e63f0e525eb3de5aaf11da5b8c
SHA512929cc61c8a9c4114e709dafe647875dac647be77fca9aa143fa0ee0326a775285d1002d5ab59b6b41555e4db5487c24229432ed72294f764ff4f330ecb643030