Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 20:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/pytorch/data
Resource
win10v2004-20240704-en
General
-
Target
https://github.com/pytorch/data
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 612 msedge.exe 612 msedge.exe 820 msedge.exe 820 msedge.exe 2292 identity_helper.exe 2292 identity_helper.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 820 wrote to memory of 3368 820 msedge.exe 81 PID 820 wrote to memory of 3368 820 msedge.exe 81 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 4140 820 msedge.exe 84 PID 820 wrote to memory of 612 820 msedge.exe 85 PID 820 wrote to memory of 612 820 msedge.exe 85 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86 PID 820 wrote to memory of 3740 820 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/pytorch/data1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1ae546f8,0x7ffd1ae54708,0x7ffd1ae547182⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16735229486181350666,15538574978297304174,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fbc957a83b42f65c351e04ce810c1c11
SHA178dcdf88beec5a9c112c145f239aefb1203d55ad
SHA2567bb59b74f42792a15762a77ca69f52bf5cc4506261a67f78cd673a2d398e6128
SHA512efad54eb0bd521c30bc4a96b9d4cb474c4ca42b4c108e08983a60c880817f61bc19d97538cc09a54b2db95ab9c8996f790672e19fb3851a5d93f174acdfac0ce
-
Filesize
152B
MD55b6ff6669a863812dff3a9e76cb311e4
SHA1355f7587ad1759634a95ae191b48b8dbaa2f1631
SHA256c7fb7eea8bea4488bd4605df51aa560c0e1b11660e9228863eb4ad1be0a07906
SHA512d153b1412fadda28c0582984e135b819ba330e01d3299bb4887062ffd6d3303da4f2c4b64a3de277773f4756da361e7bc5885c226ae2a5cfdd16ee60512e2e5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5a640fc09e01c25242d20caec4e254743
SHA18a40bc7517d2e642aaa0ef30edefbd919447dbd0
SHA2569c5ceb9ffaef61276b6c5a7ba6f0b3d8b908cf1cc087fbc2fd11e7642927f22a
SHA5124d860c52e44484410299a555ddc7f09cec8edd68b8c3e7e72e3b64a7fe177d981ac66ebac0d85eebaf47ab82cd4bebbc46fb621f14ef75344f86c6395ff69086
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
496B
MD55b2d55db23bc2a600a28fd7d39bc8279
SHA19a4fd961388ede2b1379aa4dd327390d632217c4
SHA256b5447ae1e2fbda390e64da26530afc8e7d9397782b21d5f19f781bcc4fcf207b
SHA5121e7c90aec7f7ae8db2867f7e38f3b75058804a2c1e5244e4be678e165fa510f6d1c4226c555daa8add5a411cdbc56a0becb3fce301620785973c6a60935e5f66
-
Filesize
6KB
MD5cb56e8615650400f4004964fe824e229
SHA1ef959520511c9190660c424e42972676725086b4
SHA256f29123f65239a1a3c4c32dc4a04e43df2152d7cd076d92b3fc5beb5e93579c29
SHA512bcee75ae40817f4a6c1dc30e3c21e7cf818a6ccc74b5a8c53ff680deb348e7b14002e2c82db4163087fd9083f9432de05baf5055bef1ca1ac557680fc2d97c31
-
Filesize
6KB
MD5fa9b27fcf645efb3ac152e88489353fc
SHA14fa2574f50b3c61900352eb44f0dd182f51592d9
SHA256c2d48d864ac64d36e1ed490b863beb7fa1781b86a2a765f90cd8a1c90ebc7224
SHA512670ce5cf57966de77152fe0069e9bc502cbd4223ec6691cd5fe926be80dc618ed4c40d78e647097ea4cd5a53cd5b00b1fc06a80391aec476c19db92b4ae4d53e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c311c6878083aae5ce14435599be9c27
SHA1f67848d607b4dcaf29aa4b42387c8ddc3008a35a
SHA256f9dbdc561fd2ced53eae2521f25306bf02e9c372b36b7e13731016a542f32811
SHA512abe531e4e687b7ad7c67d30c1b8e506d5a340d82deefa0e4d43c5675ef19225306ef2b21f79fc0a91ce4ec16a748a64b243650fef40e0eafe90c8db03c7410dd