Analysis
-
max time kernel
1800s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 02:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20240709-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2732 msedge.exe 2732 msedge.exe 776 msedge.exe 776 msedge.exe 4176 identity_helper.exe 4176 identity_helper.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe 776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 776 wrote to memory of 2972 776 msedge.exe 84 PID 776 wrote to memory of 2972 776 msedge.exe 84 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 1600 776 msedge.exe 85 PID 776 wrote to memory of 2732 776 msedge.exe 86 PID 776 wrote to memory of 2732 776 msedge.exe 86 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87 PID 776 wrote to memory of 2832 776 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdea6446f8,0x7ffdea644708,0x7ffdea6447182⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2268,14071570639176705349,9996959767906724386,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c7ad0c728c3d0251c41b0c2efceebef5
SHA1670d3b7bbf84e787be01fe8b089581aae567fc70
SHA256f44f732391167a6bc2bc2dbbe404b488191a033b7a543ab1522d08df08df86f8
SHA5124d6ff2f1849334d7a5dee736fdf7734cd6b0f449799917c135c03bedbc6c71cfdf47ff375182320218549c1337371684a1878d664e8d1397c9d44b905de88864
-
Filesize
815B
MD53e69cbce6ec51b2a8499c7a575d4e3e8
SHA161c2a96072a5dba906e5730bcc880a91486cad2c
SHA25616794222397ee36756ac3982d49be8b81bbd9d75d5c746f82140c32fa898dc52
SHA5126b06087312134211e04dfc1fcc7805f00c9ab70a32da61a796787622687586c6d66b4920a764b8dc2bd7d28a3dd5db98fd6d0850c3ba92b74ec2a4e0972228d8
-
Filesize
5KB
MD52048d1a22f686ebb167e54920720429a
SHA1c3b9ee0f7766e2388855f992aec7506c2f9bc9a9
SHA256a5ce77770b2fc2ed0b9a35865de359835501343b80e172ae69801dc32fa2881d
SHA5120dacb9a9de83a606b7bd4ef9301cb33aeb59ec8ddf4e2c9f544759d4c01161d940675643c8a96705e783978a77efd57461df54422248fa9a28bc5a922b5113eb
-
Filesize
6KB
MD52c884863ad93746e1d1d4372a39451fe
SHA10dae8458dac770f0000f18c4b45911d81deccd9f
SHA25684875a6cd075f580a32fc94b78081a6d8a7d6eb4e7a73f3025a8b2bb454cab11
SHA512daf79e77b89e6c1cb8f15b61c1e40968d2b5f2147837f4ada31428c7af5ecfd4c30ecced4c30365b5f4777e2d207a131c48b320e02e0f6ed80d7228852d70db6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD57aa3e50e0bb7466b4b248479e82b9c7a
SHA174604f9115a375b49a7817b0a8489d36b442b985
SHA256fc7fada6e6a62e87d53de6fbb13e1aac3b1dcc87fb3787fdd6ba573ccf20516c
SHA5121a5f30d90dc5f0fec70c3993921e2cb2695caf281a6ce1fd283c3b5c9b378fca9416cf8cad94ac0fc098c862870eca26f26a645aed40279876f1128a59e3f88f