Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 02:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://skinno.sharepoint.com/sites/team_SKI_10870654
Resource
win10v2004-20240802-en
General
-
Target
https://skinno.sharepoint.com/sites/team_SKI_10870654
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 1136 msedge.exe 1136 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 2352 1136 msedge.exe 83 PID 1136 wrote to memory of 2352 1136 msedge.exe 83 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 1004 1136 msedge.exe 84 PID 1136 wrote to memory of 2816 1136 msedge.exe 85 PID 1136 wrote to memory of 2816 1136 msedge.exe 85 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86 PID 1136 wrote to memory of 928 1136 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://skinno.sharepoint.com/sites/team_SKI_108706541⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9991f46f8,0x7ff9991f4708,0x7ff9991f47182⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,428627703982365436,13316801595966371087,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5b3a0e0e3a61c5b6fa49cb54a19d82a54
SHA1c00e18c27b7ddf0c54d2bb1b4b735ffd11868e3a
SHA256671a04484c83e491c52e57db513fb9066b2b1eb5b82ab26db78ac6f66e812ff0
SHA5120f6d7394f4e96588de3db7e54a58346e4f33fa3f619641272968c022512551f4f545f23c4d5bd87006fd33f7f3b27093135d5f7cb874f9b27e986768d50ec388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD545e3354d8d47b1b1bddfe7010268c110
SHA148407b9b37b38a37c43e9b0e1b696a3a183a674e
SHA256a1ac67068c20bd256e8c0e873075b49807ac69526663d003a93b811675b78372
SHA51219c6988d50affd4fc1065b5b90180c98cf77413d12cb1da4259ab3e7506add082aa701f53ae06e84a9e082848e3ad535d19fb6ccba951b44e262f0f20132a939
-
Filesize
353B
MD56ff47c04fc977a94ccc6be7a49e874c8
SHA174a57b43b17084113d6e39d2923f4f976c332be0
SHA256fdd5966897abe4eb07eee1145d6b61ac5080438ea392a56e017f884ae3e8ee18
SHA512ecb49a461b1da3078fbf5902b35e72213b156683f88477d571ca229fe86c6751194a62feab2be0ba77610b68d9737eef8cf42305d2210fc62a54486a09d2a701
-
Filesize
6KB
MD5f74600bf1e8d38d8d10da5f073b3ba7c
SHA13ecf11f7024ec633cbdb28dc4ec18771c1706fd6
SHA256a004a9005bf4fcae0380097f293e53b871e9140e29ee4b69344f6ffcf2570e15
SHA512b13ce70db94a381e60ccabd38657a810d30f8467caa724fc5b0f456d2d5902a1f67a5bddf4f58d5052d4844e9df6e7d6c4d7a9473ec916f870143369146e252d
-
Filesize
5KB
MD5b38a1731151ed456e3c741015b33d041
SHA1417aec9dfc7dbe7dff90cf66b9c7ca1b03247767
SHA256612f3180d1891ccdbbdb70c3f7ffb508beb2309d1f7b297fb6a7868d1bdfd87e
SHA512ad32554d374e8a51cb1bee9a0d45c826ffdfba89c6074717f936f106554c297284de9d5a968abf95662f0f27cd96f1a001112b68a25b976605a294470181f928
-
Filesize
6KB
MD548167287670da6da18ccfe814872649c
SHA1f56ac266b4ad50a00dd8c8efc19e446da1480eba
SHA2565faf1fd1a5e626842cea3d3114a977555500a35f06c1059162fac953ff5ac5b4
SHA5125ab58ba0f7d533eed920933253bc07b326d5e5158a4cc1ea1e12be530e6c8b0ba2e441c5ecf9cc98fc9ffc62e7aa0e22469c8e091fee7823f26b0f9d826193f3
-
Filesize
539B
MD5c719ed22441327ec0d5225fdbceb2c22
SHA1361ee6f8bbfe5519d746f6dc10327e8e5a982a3d
SHA2569cfb5d7309c7ee84d1e678db1d1cdd893d4540723404b32d6123a5a489e828ce
SHA5129e4d25e407082e13412d4c13d7f3b8cacab6f4d08c2ffbdb0f91ec806d05b30979d790134302e2539a5bd40a77d0bb43581966f64cd2df57c5eedd5fa2e7fc54
-
Filesize
539B
MD5e68e7ab374742fcee09d15d2cab000cc
SHA1f4032e7e397de649e26dc34b179fdb7b40f3edac
SHA25642df1b3f0fdf1001c02d6ab4d6d06e9d9c9f7709c038c403c3f4598fab200005
SHA512046f3ece8fc058c6865feb0c7f3d3a76ab7a0ed28e8a714ae80bd1bb1cbd093ce4c0edd8564946147de5fa2bf8c21ac150361defcce9e1bdc6bac9f46a0aee75
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d19f90b6c8c6cb70333b252743f5121c
SHA1faeeedf9148c1e8112785954d0b1ea047d474b82
SHA256b0b04d73df9c357add4f5d3d631000a773caa8f3e57c7f98622b3703b9e855fa
SHA512594e8aa1cc8fcbf8e9b8d1c4456c17c9035f8a34fc9eff738cc614f0560118d0ff711c84cf8ab4f7c00a734f2c62d25a700247a434574e25ecbf7f111586832d