Analysis
-
max time kernel
23s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 10:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20240802-en
General
-
Target
http://google.com
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5232 SnippingTool.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5232 SnippingTool.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5232 SnippingTool.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 3804 632 msedge.exe 83 PID 632 wrote to memory of 3804 632 msedge.exe 83 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 440 632 msedge.exe 85 PID 632 wrote to memory of 1096 632 msedge.exe 86 PID 632 wrote to memory of 1096 632 msedge.exe 86 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87 PID 632 wrote to memory of 2572 632 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd65d46f8,0x7ffbd65d4708,0x7ffbd65d47182⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,8694695367799561114,2512670525504321376,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,8694695367799561114,2512670525504321376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,8694695367799561114,2512670525504321376,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8694695367799561114,2512670525504321376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8694695367799561114,2512670525504321376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8694695367799561114,2512670525504321376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3944
-
C:\Windows\system32\SnippingTool.exe"C:\Windows\system32\SnippingTool.exe"1⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\872e078b-4e67-435b-98b7-41b9d88e3a2b.tmp
Filesize5KB
MD553267f6175c2db7b977a87e5c3877097
SHA1af515c1180fd088b7d54fbd44ba01059f4887a4a
SHA256331155ff6d1665abba4d8f5caadf79a4cc5a80121850b598505e28492e331253
SHA512e381bab18b8fb2a4fbae50449fdba78e7c42cf63b571d6c71cf4648c8de65f90812839dbcdad3b4629cf5d692ec0e8f7e3b56501f954a522055a22fc4d69c0a7
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b617625406151973e1121a0abee8e401
SHA16779fec0e31ef3653eb9dfb0a7ae312188848cf5
SHA2563e24b9ddba03e8762999aa6306cbea51c3865381f223df45a954ea6f49120a8a
SHA5128459879a8733d561a96dd89feab0014f03dfda4fc3ac841e4a15f4326470708c66a5bfa41debc09a674829147663f8fb38f2ec6152ecd1a66a96790f32bf5446
-
Filesize
815B
MD51c1f0388c81ca8e751fbf9e0a96faa65
SHA1af4ee68cdf2d877d9dc19d5b1f9f722b23e78213
SHA2567e9300f228f3f1baf1221547f70d2eae8c3fb3199d36ddb891753951ab567124
SHA512c296e27a21cbb7f444a67a2233c66c8159b5f2281b01ec4a3e216f1ac0c5fad1b419b82b29d007ca8d2ce849376cca4b0ffd8477a0516e1d672bbc1f5b4ae3e8
-
Filesize
6KB
MD5017e5024857265d98811610aad93babf
SHA13c1226f6444a9c7558447365bb53470fcba463cb
SHA2561975266e0e2512fbe567626d3273d234b7239ba6f0a442e0ed4c13ea938e0560
SHA512f1ace70b62329d582603e995376fecc887fedad6db2d4535ba0055c7c53f024eecfbc939361aca535d13faba2949e77d4e58d73a95d54697b52d3c15a8ef64b2
-
Filesize
6KB
MD59a37d94b1b89a629fad8147d95be08c5
SHA16903634786663ebfe637628e924e077a1d589699
SHA25628fa5b327359bdeefb575a8e3f7a7afc6a396356f3368b40fc9d1ae92620f6b9
SHA512c475fbce8acdc99f13d1db09a1bd2949da26092fd4e2c31e103cb7734ac0e19173e3a67603dfd1a3d9006f7794a2bb1688fd1371c2c668c29825f2abf17ece28
-
Filesize
10KB
MD54ea16ecf7978f01d216c8d0c2c82ec46
SHA15a73759679d98ef85d61b530ceab4289ad12eeda
SHA256e0cd3092851a76ebb10ca778ede38b7629cfe3a715b4e9d78b97633219aa1996
SHA512f76d1eda6bf71f749b2bfb36ed12c06b2e729b5e8bd0e880cc7c27d35b056386534b72220265dcb2833b3218012d5fc250b0a1668ccddf3f193cca91ce35dfa0