Analysis
-
max time kernel
74s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 12:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://firstpriorityprocessing.sharefile.com/d-b78703c6a616423e?a=f976bda31fb2a291
Resource
win10v2004-20241007-en
General
-
Target
https://firstpriorityprocessing.sharefile.com/d-b78703c6a616423e?a=f976bda31fb2a291
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4820 msedge.exe 4820 msedge.exe 1128 identity_helper.exe 1128 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3580 4820 msedge.exe 83 PID 4820 wrote to memory of 3580 4820 msedge.exe 83 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4768 4820 msedge.exe 84 PID 4820 wrote to memory of 4024 4820 msedge.exe 85 PID 4820 wrote to memory of 4024 4820 msedge.exe 85 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86 PID 4820 wrote to memory of 692 4820 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://firstpriorityprocessing.sharefile.com/d-b78703c6a616423e?a=f976bda31fb2a2911⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccb0146f8,0x7ffccb014708,0x7ffccb0147182⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3608 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6691445892986288093,12874598176275804059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\10d395e6-697e-48a0-941f-ab8db8de614f.tmp
Filesize6KB
MD5006290102f418014c3d0d112f665b420
SHA1aeaf20a60595f40bc7286cf5264626bde36f3bec
SHA256647bc8950d1463a12881d1f7b5d8f7e7b15cce80d0c5f13e2cb965e67378e282
SHA512ef180b0cd8f571dcee482bb5d8cbfa76440ce1b10827cee18867b4c734663e0770b07d2b6c1689816b9b39b119ad3e1559857d105b84bcf511854fc6b7ab3ba7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD53b652ec85efa1eccdb372ae1f97aaabc
SHA191eb05c7795a5e70ac80ac190071739f422ac2a9
SHA25669b85e418dfdb661fc7bf6c6355663fc4f20db54a047065834dea9823d1bf37a
SHA51289937b14625cfc67a66583e5ae344de76bace6c4970d98e9f9ceb78e65308e523c21ee23a603ad769dca1a7f695fd1e98ae8b01695d7167d77e3ae806d71d829
-
Filesize
1KB
MD557c580dd0076d6cd4210e30f7090d309
SHA15fde4734946da2cd731384476d65ef0d7bedc92e
SHA25682d46871c6eba6df12197e1b16b01460e220efde9021d3242900380137c4518b
SHA51233311ca2694cd5cdd450f545e717fdebe4788a3baa78840c87e26feff4c7744a4471acb2fd46c975e59a13f56063452c8bb8c14ddb5ab82039b2a3fd77b8221f
-
Filesize
6KB
MD5a1655f4a3e4514fd12118485b7e1cc60
SHA1d56617755fe2e150fd9af3a7ace4f7b91192ec5e
SHA256ecedfade735eb08a762b04f9a30c296d52b87af18267e1770b93bbd106414709
SHA512b4a05dcee1eed101a81fe2e393b006081ede29256aae97cf7a62251670c13bdd58a9be2cf8dd0bad6a7a609f75874a1abfe27f45c0e714319d0ada0077162c63
-
Filesize
6KB
MD5860108c38c0a0747840d62ab72de21a4
SHA1c7bd5493da33083e2a0aff52c4752ca461586bb1
SHA25675b7c913821ef11912e195f51354fc82dba3bdbef1bc2b668c796996bef13257
SHA512acd4e847098e59052f7eb393b3e0d8fd3a235593cad99a6563b4ba27222badb04ccb00d43de40853d32bd2b5ed398e4e6e251c822bb607ab23465bdccc304684
-
Filesize
697B
MD50a350e7cc315ed140af10edda60b4ba5
SHA14c6b5432db2cd48de4d1d1d95c96013d3a68a47e
SHA256fd5090672ccd8687253281d275a107ea2718c56248d4491aa868606898c1e382
SHA51274c20b098480a88f4df53213469ce637c5ee9e92d3144d6eac4211f8c2cc5bae0429370ea91cea8c88dc58f9b2fba815634a2c136c9e4626a981e0013756812c
-
Filesize
697B
MD563d9f868f43912de11513a8c198304e6
SHA151413bb683bc38dd77aaaa353dc2a07ac06a5a47
SHA25683c86309c7fc03e3d250c2ee65d76d37db4e68abcd382e22ff6f3d5d05d5ffce
SHA5125e226cdcf513ba5a450babc13669304d8ed4a5fbe33e40a93be0b5f9292f1014f07a58538ef75ca0543b7be27c3223d80f8d8d41737858716e9c4820af7cf84e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD508c181d798305ffb80973785d940ac6f
SHA16ad7e1deef6f16de98d223e3325a4c5cd146b656
SHA25682a15f08ed9fe019f1e8df6148c4d255bfab543021829dfd27ad0f06f53a246e
SHA5128ea766778fcd34beabe8981ba0bc293ffa951a464bf5be52f914b2c544d081a5b1e48716b3108f66037f6d0ad2ddcf2fe554b8eb5b36cd3040d719bcd20deaa4