Analysis
-
max time kernel
23s -
max time network
29s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 20:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://javascript:void(0)
Resource
win10v2004-20240802-en
General
-
Target
http://javascript:void(0)
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2428 msedge.exe 2428 msedge.exe 1308 msedge.exe 1308 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1080 1308 msedge.exe 83 PID 1308 wrote to memory of 1080 1308 msedge.exe 83 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 4936 1308 msedge.exe 84 PID 1308 wrote to memory of 2428 1308 msedge.exe 85 PID 1308 wrote to memory of 2428 1308 msedge.exe 85 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86 PID 1308 wrote to memory of 5016 1308 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://javascript:void(0)1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a90f46f8,0x7ff9a90f4708,0x7ff9a90f47182⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4180 /prefetch:82⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17021911979113612724,5729811874340869537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD5d614e47b4738db48c227570f32c8d966
SHA154e46b005f4bf845935d0a920557b02ea1aa4284
SHA2561033e57c38ab781f56aea5b45924c765019f2150baf68eb2b4533ef99acf64aa
SHA512c58abb4deea7633ee5594d135143803d0d0adbe0e095ff406198aeaa056e329fa84bc5849070064b9bbbfe955b35eda46a9ab32308a918d89da069f2892631f0
-
Filesize
6KB
MD57f2092755c76b503fc171b650392a3be
SHA13b1b9185533077bc3b03422ac95bc8eed882982d
SHA256d84cbfcf171c085d67b0fc011b557d920985f279a596befd0f08c3a612593f77
SHA512780c3fc196d237e167077b7805ad8694d8b0180faa56d0e8b8bb35a73d3dfd06a333e223858fbda861fa15c29ec07679f34c161aec3de74cad23f56aa618cc98
-
Filesize
6KB
MD57b5fdf5d6f376aada69a6f80ced62844
SHA121ab394f0ffe5cee2d073ff25b315755b1428a5c
SHA2563165e376a498c1c68f399ea95c271abebd7d8ca06aee1eb38730458599b24671
SHA5129b2ef961d0edde2d081e42417c3252879aef23b53ecc89f4003cf9cfc65bc775286cd0f186da6cb28c38e2877b2591b236cd4cb39a0fc864a9c25699e35071f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5229442ed2ed9a9846930c349bec84f77
SHA1c7621b4c0f1337f1eb962285e06242a39c2b341c
SHA25663a8e0031e4c68c60b693c5fcf22f84fd6dfd4ff7da8df13dabcb504ea7abb3e
SHA512ae4af30ccb65ca2511d649a16c9697874af39061698aa6b55ecae7a4f75f712546c83b9fcd8467e0b2340ea873ea141f54291926839c3ad8569af2bb275ffd0b
-
Filesize
10KB
MD502520b41e2972469aa2fadc2419993cc
SHA1170ddaba53897094b9e0cdec05eac807c1dcc242
SHA256aec3ba99e5d360969a63cee08e260b5d4874e9969ac10a0cb2870419d384cd23
SHA512adf86eba27793936f0f79c85e39331b0ea55d4beea5f98b28b3c515217e6b4606b415a84c9784e68dbeab31626e5270486fe92050577e988296e13ef59417e7b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58