Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 16:52
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4284 msedge.exe 4284 msedge.exe 4456 identity_helper.exe 4456 identity_helper.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 2036 4284 msedge.exe 83 PID 4284 wrote to memory of 2036 4284 msedge.exe 83 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 3188 4284 msedge.exe 85 PID 4284 wrote to memory of 4976 4284 msedge.exe 86 PID 4284 wrote to memory of 4976 4284 msedge.exe 86 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87 PID 4284 wrote to memory of 4180 4284 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://microsoft-outlook-microsoft-outlook.almajapharma.com/?no=bm9jQGRpZ2l0YWxvY2Vhbi5jb20K=$1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfe3d46f8,0x7ffdfe3d4708,0x7ffdfe3d47182⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1816 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,9946777826096117063,634422291980549102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0b4da386-57cc-4b22-8784-51f8d5f170c9.tmp
Filesize6KB
MD55069279d3cfc0bc54c5a19f639dabe35
SHA16a50af46774317a85b040314150c5314deac360b
SHA25629163f8b51449f29484445286ddce0173a79a0cb0ce859aadfc5529c6aab1d0f
SHA512c10016a48ec683c26a7804e4f883e84b7f1f5adb4528aa361e94acc312f11daac2752e2ef209a4d09df6d79e68f1aa7bc1e122591ff82f304122b0fd93887359
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c21c61d5b93279047f6bb45cb0c47eb5
SHA1ae1ad842b59dee95f520e1b85b20c1110d40d735
SHA25645bc52904eeec08d11a65b98caca9284e1383163bfaf8c85e34202eaa8816cf9
SHA5120bfefb3aa7eef80904cb225ddb03ff705a16bc216a4b34e90757bd7c21330266ff8f162111e7202c9cb80b5652fd719c6e9337e37b57e7261b31199148647f7c
-
Filesize
312B
MD56931a5618e3de37188c42f08315aa026
SHA1036462563864ad3447022105c506c8879007e811
SHA2567bb49cede96a19196f93e29be46c05d16d908195c3e4f398f19a7dbe27489f27
SHA512146e783fc5563bfeb2236e8333ce39602e57661b363400286548f18e24801c85416a99bc91bf8068893fff271fdd96c35e002ff7dda891f5eea5deaf3c5cb2a8
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD507d45a03e93c2ebca1640a468e7f70cd
SHA1de4207d9b6e726a9b344be96e951fd27b2088625
SHA256456cb797d8f936b47167ccac1f8f5eb33eb9af8dcd3f5821c7e875176c43ed73
SHA5123d34bc81e944318be8897fcc5edfaa5825b7251e0b3d290ee92444904d83586b7f0657fd11759d2d99233bd6cd4cdfbbc36daad4fc1930a04b70f5b98f6ebca4
-
Filesize
6KB
MD53fac117b185d5bc3e9234131d1f123bf
SHA13ba81e96976f773d0b7f7e7d3130985d7b5724cc
SHA2569b1e0c1f6b2c05915a8aa6957f05bd3c43d814cdbf857244a50f2dac8ac6fe93
SHA512f23a889fa1396bae3db74073fc9ba8f36e0136d82867b82931c9c1234b3707dc05604a756cd7b244f63b720abb3ba89356e36e373746a944acf153dfac5ff26e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5383eb219abc7e938af5ddad0509af42c
SHA106bd8f4ba10291ae0082e9c63c21df728d253c49
SHA256ab04e74044500705c0453f1a86a0db2c42bd325bd5476c81fc3c731c8d7f5c76
SHA512831fb07e21c581bd99a826ff2af446f5206f1617b2127a1dbc85df82ab26df380a253baa658c0d22c74c90c09470a1969f20b4208689c1cd9e744e191d2b0188