Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 16:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://
Resource
win10v2004-20240802-en
General
-
Target
http://
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 4712 3644 msedge.exe 84 PID 3644 wrote to memory of 4712 3644 msedge.exe 84 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2760 3644 msedge.exe 85 PID 3644 wrote to memory of 2580 3644 msedge.exe 86 PID 3644 wrote to memory of 2580 3644 msedge.exe 86 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87 PID 3644 wrote to memory of 5116 3644 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf52246f8,0x7ffbf5224708,0x7ffbf52247182⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10005327695956151040,8942223546813161406,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10005327695956151040,8942223546813161406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10005327695956151040,8942223546813161406,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10005327695956151040,8942223546813161406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10005327695956151040,8942223546813161406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
6KB
MD5078f286a3bb8955857370e7ab5565f64
SHA1f55c9e2efed2936ed6f856e487ac05947b45ff56
SHA256b2d504969fe6dc3dd49ef51447013061839d8cadeffe38892d3e19231cb005f5
SHA512230d04ef5bca7e14cf65ac7ae96f74c583b0575d9c313c60cd1a979874694dd522631b907463150026e5ed6834dc7a5afc744339f6f6109b2c0ea438e70a9778
-
Filesize
6KB
MD5191c7b1c1eafda27c0ee8efdb5af92bb
SHA1cfd03f87b520921fa368b94c387ea3048af27908
SHA2567dbd8d0a95eb0008847bd5aeae3ecc6c895358f8b5b4c64c649f03089bb291ad
SHA512f4c7a3597a3f07ba3baeda8f4d2b434049216e566d8a9e9c3ce3dbfdc428d3a7d89e22f28bc445c97c50ed3e2ab3751019ab900f4b1b6a460bf09a7aec8130ed
-
Filesize
10KB
MD5e01d0c0452a6ea57abc81eff7f2af31e
SHA15d76a7589dbe91957ca4fb2cbff28a317e9e2a53
SHA256e0225cb1964a039bf1f9ef638456256526f0b9701ad4827e2697fc08d1c2b5d9
SHA512506fafcea04736a66076ce5d7ef7612b7e7b09bb81a54abe04a66bd3fe4e78a85c322f662d5ae656b2ae88e47454492669e7e835154aaab15fe6ed2a79880399
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58