Analysis
-
max time kernel
176s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://urlscan.io/result/31e44221-311a-458e-b68f-7ebe73e937fc/
Resource
win10v2004-20240709-en
General
-
Target
https://urlscan.io/result/31e44221-311a-458e-b68f-7ebe73e937fc/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 3104 msedge.exe 3104 msedge.exe 2880 identity_helper.exe 2880 identity_helper.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 3680 3104 msedge.exe 85 PID 3104 wrote to memory of 3680 3104 msedge.exe 85 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 1420 3104 msedge.exe 86 PID 3104 wrote to memory of 2004 3104 msedge.exe 87 PID 3104 wrote to memory of 2004 3104 msedge.exe 87 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88 PID 3104 wrote to memory of 3652 3104 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://urlscan.io/result/31e44221-311a-458e-b68f-7ebe73e937fc/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcf3246f8,0x7ffbcf324708,0x7ffbcf3247182⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9351686899915437851,17024263271616170435,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
178B
MD5df8a385ea98ae9d253cbd7bc24c5f4af
SHA1d15acac7c2a5f4c532baa7ccecec9d1dffec2465
SHA256a293e1b3c6d1a4344e5bbc58692dddb3af2540948e866db88c2177482c88452b
SHA5127b2a7021d6326532a91070eba4715e31b51e3e7fd88c2160011d82055c64255f1e33bfaf585320ed54199475e81534112afc51034ca8634ff7ed45004abd5c84
-
Filesize
5KB
MD5706ae01ac053d89d715d30d2ef94522d
SHA1728e0909862ae57169db4a9c84bb154f8cc3ffdd
SHA25618edcdcb6b059fbb9b79249eb893eb6f134482b1d372fa6e30a6ef63cf58a1e0
SHA512bb46f64c603735c3f19faaab52eef20239a9e07ae1bf55541e2b1930e295244e218a658cee47bc404e070a6b322bb84914cb91251ae7166dd33a2fafea2a54bf
-
Filesize
6KB
MD5904d2158e1cd21ee8edca0769cf42f8a
SHA13d718d4c5cf3e7bfadd6308d1281c9644b673e3a
SHA256d574d11955df02f408d7377392a2207411a72e4f5e0e1bb744e933beb343e495
SHA51257c4b10f820a1c3f03e88144bcd6ac871d38fa9a4b418b802116f8351e5a945a82b1177f1616febcca6d4a999a8b5721104e3dd306cdd4ada5413209c3a6b847
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD515496f6d242f8eaecb8fe65049507a9b
SHA16282d9683059fab8779fb297d385426f1d907382
SHA2567da0fdfa852212aab32ca87e0105cd3a395cf5462c1ae8484d40cb2c404b8584
SHA5127df2e43918d73e2004febd018758ef1c6d7dbfee2fc513d084748b3525f6c2da0bb4bf4ec913974d45d4aab072a510d1a8170e8abf626b50400261e38e92e8ed