Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 03:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.microsoft.com/fwlink/?linkid=2048113
Resource
win10v2004-20240802-en
General
-
Target
https://go.microsoft.com/fwlink/?linkid=2048113
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 2464 msedge.exe 2464 msedge.exe 2440 identity_helper.exe 2440 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 5004 2464 msedge.exe 83 PID 2464 wrote to memory of 5004 2464 msedge.exe 83 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1816 2464 msedge.exe 84 PID 2464 wrote to memory of 1360 2464 msedge.exe 85 PID 2464 wrote to memory of 1360 2464 msedge.exe 85 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86 PID 2464 wrote to memory of 4920 2464 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?linkid=20481131⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c7d46f8,0x7ffc6c7d4708,0x7ffc6c7d47182⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14690432852318306252,13967408367752324152,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:5296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
77KB
MD5e41c0a10b5ec4ab6a43dd91cf96f69a3
SHA1922acc60aa37469236345ea892ce07c4cc4e6592
SHA2560c56f42c7be19df9c2bc4ed203a30d83605c6301d06154cce0761befee6994f1
SHA51239023ca5c09813ad72b328b1daee83d2fa29f72fe529e3451fa620866c3e1e8ab7f1dc370f3c2c24fd34a6f5448ee9962bd7504a18686c445c5c2aeca46551e0
-
Filesize
38KB
MD5bcc11ca3762c94b904cb9ff73db34d57
SHA1199e5590f345f6a2c9f8dc1b812279d04490548e
SHA256c1f91e12a8da4ad4cf3a4b428a3f21586228f3fbfda5362e527224ccdc136990
SHA512ff02d4eb65026d7c94fcc0904b61cefa2a10a4ba53d58ffc05c3a47d2da6e7faf83b43ef410309a6851bb55fdbf6016ac5adc7e4adfeb3db5bed7b0b4154f796
-
Filesize
36KB
MD5d968d77e41da2913a5cd3ccbcc46c4d3
SHA117b989846be572bae88c23752d6a1b1726570733
SHA256a57cbd2de0717cb45874975bec08cae7658a0d9b09f6e6f9c992c6a044defe44
SHA5125880fcbc9c864b216daf21470dd3e4082f828a3872776f095c2037b3f4f2d49823bc0ee7c0d47548de1eb99659474b0e49e7bda2c7278f5262818d6a7ac8e292
-
Filesize
7KB
MD5c65f92300015e0b7fd3ca55624935068
SHA1acea238fddc308cf50bc9358b7da48aa0d15138d
SHA256933e5fafab632a14f1efd07206b73ae2c365bebf35c8abdcd6d9f1fefa1f0243
SHA51288358337f4b63b5ddcb614f72fe89690e0e81b2e0e3bb0830b36249bcd0a23c0f7fb51e172cc8ec2b157f0b9fe61c221bc42e3e6f3c013d2164baefa453c4f1f
-
Filesize
5KB
MD5a6df497ba349c1a0a666bd11a308b89a
SHA15b128b0721cc71528d7bd65fd16bc649d00d375c
SHA256f259b8f1ed19eccc64ff4bc58dbedab085c7bfe430c1d7b57bd5c4a049f4d03e
SHA51247ec2697efd76cc9bd0f02ef94ab39fba804254bfb517bb3617b0e24501ab19422e00237951c85e93fc065e5fc8765d4f40cc27c7a5abf26016311b0460262dc
-
Filesize
7KB
MD53a6edc177307c4905494393a46530f28
SHA1ade1e66d17a6ed77e5c1f87341bd272bc94d6071
SHA256461ca4acac85d16e81347e984a2c2b98e66bbf30360696fab9a300d42fe79bc6
SHA5123cdfdd6c50109bd108374c067e0c36456830f164501ba2c5e0abab115bfe7847a1eb7d315b2f352066b5c8ab72d651461570478c433b16aa65458f116f0ea4a2
-
Filesize
538B
MD53962627b262c47a9fb964551fe3259f4
SHA106c8a0e11408997b8957de82f57c930b049ec697
SHA256cba174d4e3ce07b45d14605bd831391d10961bd1c6758c728ba425fdcd873420
SHA5124adb006f997fa80b70343bf509d2c60fbc9f6e375b777c1399c225174118306bc21339863e498e162ca37427cc62a60bb2306e1f0f6317c86547de2f4cdcb71f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d66fb9ff-579b-47fe-95e8-4fee28c98689.tmp
Filesize1KB
MD56ea306b64a4390f5be76026464046524
SHA16c8d6acf3fc3b64507a485580632519a43de69d5
SHA256e8c3f9367c3d640934bb11aed940f5edabda227e056adacffbb47b02172e64f7
SHA512b886ed61d1af0dbc5e32b075475528914c52d60031df719dcdcad2fd5cd9b1868a5b8decb437f288f5206dfb3995721715851ca3508550876a8ef40ea288e736
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c161401e3818d52072c934c7c15c0b42
SHA1fe2a4574663759f93515dfa256beaf1757a33d97
SHA256374295997476ef13250df6b8a0d943fcc832f83747c4d2d53b8ba338bdc658f5
SHA512524f3bc411e242611650b36867cc2fcbbe1624da7ff7d9c7e28ffa576abaf5b4d1dc1e213200a918431b9bbdeb745d0c9a49d806872014e9d23e5cb360d66a88