Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
e50b26e7-247a-4bcd-5260-08dcd1798b5b.htm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e50b26e7-247a-4bcd-5260-08dcd1798b5b.htm
Resource
win10v2004-20240802-en
General
-
Target
e50b26e7-247a-4bcd-5260-08dcd1798b5b.htm
-
Size
4KB
-
MD5
aa1794cfaed835391bc92b551763a475
-
SHA1
0d0f5dec8dad37b3d9467db90443148f72169d66
-
SHA256
15c31ef6df18d1ea907ceddb509450c1b91e2e27b7d90a7df8f750653b5168a0
-
SHA512
dbc41270816a0389dab2eb8082d38eafcf609f59934173d7d719c41161eefa9b71d07ae9500d934559842cf85d5ec715a656135eb469862b6e7aa74b91ebcb60
-
SSDEEP
96:uhxE7NXWPKNPgv3q3mdm6K0Qf536gxMJL6wSq9fq++OXARWMdThqx9tQ2C72:uKNPgv3q3mMV5dxMJLSqpqzOXARWMdTi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 4696 msedge.exe 4696 msedge.exe 2516 identity_helper.exe 2516 identity_helper.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2852 4696 msedge.exe 83 PID 4696 wrote to memory of 2852 4696 msedge.exe 83 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3000 4696 msedge.exe 85 PID 4696 wrote to memory of 3000 4696 msedge.exe 85 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86 PID 4696 wrote to memory of 2468 4696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e50b26e7-247a-4bcd-5260-08dcd1798b5b.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1296510764083929099,16173381301095439721,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
277B
MD53313a500015278937105ac6912f20a38
SHA1b214e09b1fd68161ce1f6b9890d5b3f1ec976607
SHA256a4465a20813b36cdcd5480a5872729e070861616209c1828adfe44baf278570d
SHA512e0aded44c395c87754046adb3370d91646ac0f98ac6cc774f41fc86352283cd4575a4d4c8b316082182c47828fbb283a3f04a4d4f70d83d5194a601cd8dc011d
-
Filesize
6KB
MD52acc348b327bb36c7dbbf0ee7df2112b
SHA1988a86e15f40eaae0eab90213fd21c21ef287200
SHA256498d3863a997b79049406643a8a3e1db9757aaaa9873fbf2020a39957931f516
SHA512648584ebd813b1adba43aa4f879213a0828decb8e5371d880287e2d807e417ca1a7a7ec13d013d8a793f9ef7fb23f6decfe4440388d5b510dc283673923948c6
-
Filesize
5KB
MD58e8f32de23934a7e65af05c3c46dd3de
SHA1e864956b733f32d6ffa3aae0ecf31299603fa400
SHA25662b9e4de59c73f2e67f4d7d4d52958d6f55edef7e5f2c4616e3e2fff8f03698f
SHA5127788677d0a2d5f4e1519cbae99fe30622d42e3f23c910d57ea29dd231d94c128d0b9c163eb3bd83a7d940edbcb822db267300c04e53bc12cfc48c961228165d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57d83844bb38adca4c40935e796fa58a8
SHA167ed3a189d7d504e42ccc24850da3371aca62e63
SHA2562c4b80011e7d1035c79acd6ca0df5b2f4027073f8a0e400a84936c9cb2d16a9a
SHA512ca175d58a781d7885d331de45e61f613eb7879d6220d0a108c5dfc574af2d2ac1c27a8a020ab7cd5888b3178c4d20d0fbf762f045487e612c6639de64daf6d23