Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 15:17
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: browser@3
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 2276 msedge.exe 2276 msedge.exe 3448 msedge.exe 3448 msedge.exe 2744 identity_helper.exe 2744 identity_helper.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2268 2276 msedge.exe 83 PID 2276 wrote to memory of 2268 2276 msedge.exe 83 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 2088 2276 msedge.exe 84 PID 2276 wrote to memory of 3556 2276 msedge.exe 85 PID 2276 wrote to memory of 3556 2276 msedge.exe 85 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86 PID 2276 wrote to memory of 1400 2276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/uc?export=download&id=1xkiYAZPFGlBWANVGCOW-rJAFSM7Xga5c1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb993b46f8,0x7ffb993b4708,0x7ffb993b47182⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16351186835627555236,17148507822653570085,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
1004B
MD58fc3fa8d368d84ddca36a23d391cc673
SHA1dd46391c54600aff378ce3cda492b6285a2f7143
SHA2560c7d78ed9fa2e82e5b816f7c070a86e7da7ad968054c9cc429a83d03299d97cb
SHA512f3db6cd93bea523f2f8f5bc4050b52584cbf18522d9ef12fffc9884d271066aff941c04f3d70081b0cfc587ceb772d4802bbb978b002799e394b23eff1161894
-
Filesize
5KB
MD59b6dfa3e5e7a1ab25b3c66638b36a211
SHA13f547838a1226fc8aed1f61b77fe0b73aaad1f1c
SHA2564d2bf7d1e1be0a1147eee629e2513e5f495383c7a95676d94598a4eb1a534f19
SHA51280345bdeb88fd705812bd52db807dded849df9ceb7e1c395b7a73790b9063bf4642ccde4bc165fbcc50ebe93d162e01d7257c91151f0893f64e8cc23913f7bc0
-
Filesize
6KB
MD52021555e10fce73e227d8b541034d747
SHA1584fc1b59651a12e92314e5fd515f59139c5ce66
SHA2569c1bd52b3517f3e888e001cbd647a7b523652ab5947d9bb40a6436fdcd06a03b
SHA512ac2ebe35db8622d71274288b0ef21fb7aa5bf9167119c89e28ec9a270e33dfa739d1556f872a039c30e73d660d5c959eb5e01112ed991f7e91edb84c046207d9
-
Filesize
6KB
MD500ad4671799ddc4bb3e4ee4523bb84fe
SHA13e4a53d70fcb58261412823ff23c08ed34212119
SHA256972c6e00ae7a253906e75819227c7e10c744b518da10fb60816213e75be4134e
SHA512e1ab2a7789c0cef3097447b0ce0eea3956f35490a45f1845d0bfa3bfa463a47f83d8c0bd9af0a58f75c3e62e3e988df75995605698806c21fdcd3ff927977f38
-
Filesize
371B
MD590c86c8b849774d6ae5cc9c640c61eb1
SHA1fd83b5676615aa973a5a7673b9cf730005e14fcc
SHA256097b03e952bb1dc135059847d1389d9f9b1f4c6f64dc10aea21d7f8586ea3530
SHA512a7d9c15d21de0731e8daf380e5b537f045de66edea50f117ee45d02869339730a3878ca6f54b1c790ead4f2df25e4ba47b875b9d8a0fd32a61d096535394f93b
-
Filesize
204B
MD5984e4b70dd47810d140122c664778dcc
SHA1dfba238c54c7065ca943bd12ef5e78c39e647105
SHA25654a7459f8b23ccbd2063ed203978efcedf66f7422753f1432ec742ff6bbb7ba7
SHA5123f29e62d4386d07f2ed601ce66166a45db1f4610e7e7957a6b0d5431723dd1f899636985e81b7631c806846c6d9a407030765b6a4ced5e4746f185441e3ebd42
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55b6b7a22d86ac28bf23ea3410e520a03
SHA133d62f185d105385017696c16ccbe1c2b36d68c6
SHA2563bb5dc4b74e7777b6887ebbb2bc48e7332fe3b792f1c14d29e8f5b48b3840bae
SHA51228dd1d3c91fc67d3cb8f48e953b420b32169391c0676d5e6d33b41d9fb749e88062124ab023053dbf05637f2784bec5d52744f67559bdfb33ec93a48646e0ca6
-
Filesize
7KB
MD542021949613d8b82974235e1a2e37b0e
SHA1d34d26edacbfd4e572519ad57518efebd9080d21
SHA256f266d2a8759a62684abf5b7913693b13544e8f8e911e34bf56dbc917b3834ee2
SHA51275d175a14d9d103f2a23500e6c97e7deee4449424f226e99a68dd5aa4922e06f4cc94ab3cd1712d1b698a1b6b170ec35ab0e80ca8332ac6af42255ba22a41a3d