Analysis
-
max time kernel
71s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 10:22
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 2148 msedge.exe 2148 msedge.exe 3188 msedge.exe 3188 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3188 wrote to memory of 3036 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 3036 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 1548 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 2148 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 2148 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe PID 3188 wrote to memory of 5044 3188 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://is.gd/SQG1181⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd660046f8,0x7ffd66004708,0x7ffd660047182⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9446569921755569033,12296359736567722050,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:3832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD58eb0f66a59ee89508be66aedf9eb75fa
SHA11c5aa5d4784c20831f488a00a7c7334da0593c4d
SHA2564af4f4c9e3a7637f47c42fe37e6665f5b734a038dfcfa4d1ca2239909dcf2567
SHA512e0bf464e581402bb81ff24b8bb77caca26107538e72f723bff2812a06d7248612ef9d107c2d2b76de890986f3687d0132d7a7ed6d4872e2c84bc53c0e7ed5e4c
-
Filesize
10KB
MD56ed49de48e159e1a4da5b5387c95e07f
SHA14baa7659c1254be8c77bd67ed6b44e7639a5ae27
SHA256f5393494378df0fec4a38c2ccf90289b29621fc2ed7af68bfbf7a9842538de40
SHA5126df80a3da57b1a2d04a5072de8b35d44f273e6c52f8382a7063856681c133866265c69feecd611d1697f7a27c784b407ba8911d586b0badfcca2baeead0cbe8b
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\477320cb-855b-4e80-b7b5-2d37fb4fc30a.tmp
Filesize874B
MD54bdd603b4722a1c7c354cd7eafac8a52
SHA1e35bf72ed0d33f6cf3d822e70d73112bcf927927
SHA256f9500eb3590a5462da8ef4ba8dfb6ba5559202d94fceb75c21e6e790021cd018
SHA51234e9a9228ec453c187d4c7d0cb295e95507812290ab9abad9372a5eaba18c3fad6c97d4f9c5125360eeba047de79969d0a51e388548dcd103a2de766bbc50fc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD5fded2462b697c0d5e0ed03201bff2f3a
SHA1abc935bb99bc76435a84b0709848138a2a5c7b83
SHA256a724e783d39e8afb6a8cc13771e2033e709c82f359a2a64d75c265aa19373f19
SHA5126668f9c21e8df808b1a771adec155be6884a7168e0b3e84a9d2162b0383f266314d00405c1c6fc45b4ba7fe837dc0b8d9774201e67e10275e12abc16b5e6a89e
-
Filesize
1KB
MD5039c889eb0c2f0f37afc7873850cc879
SHA1e0e5ed3b13c941cc8a718d9d2f3871d5227a8312
SHA256c866fbce5196cb6ae6224b8edbf1b1de111adcc41ed958f9f3d70b703b09582c
SHA51223fa034daa0473529f9319c09071b947e4ac89ee4e19e8fcfa485fb6e4d30ff4a4ef5d36c1678a48d66ef2200a1a0de34f40b7e3c6ce6bf7672c65ebed8caa90
-
Filesize
5KB
MD519e40f100394d6b2a6876c946e2af618
SHA18b5d215d033cc93b5ad01fe3f0bb66e940901e87
SHA2564ca2f6f04cf313601fe0c0a874e52210f527c768acd96ba5cb00858c3419424d
SHA512a8e35895888705db37a2a1f690df7ca560319afeac15014acfae23b3c936eb7ff083c134facce1619b403b810d13a2f54846c44906e43775e5464623795d83e6
-
Filesize
6KB
MD515fbfd4947414ecf193f46dcd5426099
SHA18fcc652f30dec9692e3f5d8c6ae422b487371f15
SHA25691bfaba4efb1f0125ae4dfbdff7f818e431f60708238b33de6b699e11a6dda85
SHA51271bc5ff8c630495f8e38af6f1c07a796243a977fa23f94b0a7ca02e640f80bae98e82f6b9751d5da044636d2bebed287de8aac14e3fd0bee53043e261bc5d920
-
Filesize
874B
MD592dae3dfe6e207375c3419a550d4797a
SHA183a0661855d0dd13891b0a69467f2842e03494cf
SHA256b408106e453c841458fc840fcfc341cbd5e669d396828131cb61671c0de849c3
SHA512f2470ecc12447a4b1666de0f15264c18af35b2273558a8e6eb577538e4618a022f02036f77363131cf335d20c72ad0d4bc25b29267cfeb1efd8da8db70d61967
-
Filesize
707B
MD5ed0ad3a393c4ce8b893c8816338c5548
SHA1962e556138c66e1d7eaf7cc1fe46b0e6a06c67c5
SHA2567429123aa97501a51a67e5b160b1ce8560fe799ba28545ad573ba22741967cc5
SHA5124d69f8b11ee0ef3d511529f0e9cb3bd69b07f8d58d647b8999d50dc993f2e7ccd88d8dba1ef3763c55a8c414664054d503ed08ea27273a52811aa0279683ab78
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e