Analysis
-
max time kernel
1s -
max time network
4s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/10/2024, 02:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://youtube.com
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
http://youtube.com
Resource
win11-20241007-en
General
-
Target
http://youtube.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 1032 4392 msedge.exe 77 PID 4392 wrote to memory of 1032 4392 msedge.exe 77 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4640 4392 msedge.exe 78 PID 4392 wrote to memory of 4684 4392 msedge.exe 79 PID 4392 wrote to memory of 4684 4392 msedge.exe 79 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80 PID 4392 wrote to memory of 3196 4392 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://youtube.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff67a93cb8,0x7fff67a93cc8,0x7fff67a93cd82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1868,12498873775911913096,6122387051456826473,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:4964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2044
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004DC1⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\628454e9-268b-47e1-b522-07a504952a6c.tmp
Filesize5KB
MD54f71da8516de9f81729e5aa3e9332031
SHA106d6a02755b2ce88e9f90faaffdd6b165b07ec90
SHA256101b599f83545e9960fdab05b6a4ed1e2e939967d6dc85799a964d77e62e3609
SHA512bd9228e5c65753e537d0c5ae7ee6aa406547466a4f515f8082f4b71c64b2f6f3d444fcc89e0fb0db80811e46cbb637698d1ee8add3b62b595b1e666a316df3b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD5526ea7a4d9b5c24b022ffc371d03b57b
SHA1b920636787defdb1f9055ac655f16f3d45cfdd0c
SHA256f299408ba321a310e152d98e84cb4df2eeb40f34ebcb07f401ea9caea24dbfc7
SHA51226c510b27f08f715697696fe9868fbe3358f69a6f337d004ef182e38eecf84d93e9db574d9bc5a300d91bd5ed1341fecb878f19c5b577f70dbb8a5b951115ba8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD5fc1981c52802760d565820331608fefe
SHA1a6927d93ece58e8151bfe69c60e863e1ffd537a1
SHA2567dd1c6b584eb66ba1ddb6748e6fcd427340f92b23fa941ad581718bc92f09b0a
SHA5123c42b68063d2a193cd5615cdd204735d9016cdb3ade249aa1b50df546c33484f957584229622b008da35c209d52ee0fea63d1ce57181f293924bbb153da1bbb9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5d36df4c26f88bc221b46121bd1c82d8c
SHA16b133854b338fe80b17bbec28de27a55cffe745c
SHA256a7eaa794bfcf6c8bcdaa77edb3dd661875ffd92c168a7712f45e097366369809
SHA51214a9552be2b2010932994721dc26b65b07cd5ca8faeaa8f82639f16558e80f2bb7679c99f93e7b13938384920eb847f66a755f166c0028d6857d8e57354666e0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23