Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://a1zd5um1z.accounts.ondemand.com/ids/activation?token=I241414141444E384F453641396152336734394C577552324247356B326A3459456B6575414C5243385446344F412532426A4559674345727236784F3161356C654B55394F4F2532425373586D6367386358645831325067676757564D794773253344
Resource
win10v2004-20240802-en
General
-
Target
https://a1zd5um1z.accounts.ondemand.com/ids/activation?token=I241414141444E384F453641396152336734394C577552324247356B326A3459456B6575414C5243385446344F412532426A4559674345727236784F3161356C654B55394F4F2532425373586D6367386358645831325067676757564D794773253344
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 2672 msedge.exe 2672 msedge.exe 4160 identity_helper.exe 4160 identity_helper.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1920 2672 msedge.exe 84 PID 2672 wrote to memory of 1920 2672 msedge.exe 84 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 2256 2672 msedge.exe 85 PID 2672 wrote to memory of 5040 2672 msedge.exe 86 PID 2672 wrote to memory of 5040 2672 msedge.exe 86 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87 PID 2672 wrote to memory of 4504 2672 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://a1zd5um1z.accounts.ondemand.com/ids/activation?token=I241414141444E384F453641396152336734394C577552324247356B326A3459456B6575414C5243385446344F412532426A4559674345727236784F3161356C654B55394F4F2532425373586D6367386358645831325067676757564D7947732533441⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd001746f8,0x7ffd00174708,0x7ffd001747182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2200 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,10777965650524834503,17424959520796580199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD516aa0edf002dff14c997aed2ec0e5cde
SHA1ccd041d18afa2efa0537fb9df5a4c62efb3ba30d
SHA2566e1c41269d13efb5f29e859a84e068b7e9d42b54b582e5178ea792897ea0f40e
SHA5124a1396f94619d5d73b3f2591c106989022ea410790caa45d18fb75bf709e51462d092cd87abe20713c7ff0efb386739697a5bc2262ac333833966c817805f1f1
-
Filesize
6KB
MD54730db2d3672f1703233eda616720ee8
SHA1cce3242f485327403611d3c4a25e923691acd1b0
SHA2560b4968851338bbe39361a1e9f654ea6692d357dcb6678f648ed6e951601cb09a
SHA5120b84b338dcdf730f3222bbdd1401241e6719703cbc2e6bad63b452e7b31b22b235a7cb55651f5f74d905a105ef500cea496c67aecbf7082eb2537c52f967153c
-
Filesize
6KB
MD538a70aa337970a59082023b0547b2370
SHA1086aade720779c641596bdc595bca8e8c8de4596
SHA2566eca7151a45e50ec203dad02889a374df41ee6e7b2abb1a44f1b82ba0373806a
SHA512b98ece67978fb85cffe35719ee2a9f67af1a65f072e1779a36f35780b4e71a76d50b5ad14e6919423d0693f593e9f88e791d74e98997982d1f292a77fa214b55
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD599db51e85bc6722c93d91d68fca433a5
SHA1d20c1f28ab7c172eabe788235b758e95f9c64e9d
SHA25603d4f725829d9587769fac7a99c120e23b0e9306c66d7475f5d8f0c5cd463b8b
SHA512d96b2e491ddf576d8407a497ce6b48329d99e9ee476218530ad8cacd05843c5766c779724e68232699064e4b4443ce90ac522bba5d498c36e29428f06c17e053