Analysis
-
max time kernel
1681s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 17:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.bing.com
Resource
win10v2004-20241007-en
General
-
Target
http://www.bing.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 2312 msedge.exe 2312 msedge.exe 1936 identity_helper.exe 1936 identity_helper.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 3028 2312 msedge.exe 83 PID 2312 wrote to memory of 3028 2312 msedge.exe 83 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 2792 2312 msedge.exe 84 PID 2312 wrote to memory of 4284 2312 msedge.exe 85 PID 2312 wrote to memory of 4284 2312 msedge.exe 85 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86 PID 2312 wrote to memory of 100 2312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://www.bing.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe67d946f8,0x7ffe67d94708,0x7ffe67d947182⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15650536235722631681,14026401671174951952,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54b7043e6084c0351a46c433d416e88b8
SHA1ce3ac11b3dd5f17b435ab8f7b41a05861d7cc98c
SHA2564b6f27b2c2756d5d9bde5b8d0842d279eb52c8cdbc1ecd9e22e74bcb9aeb57cc
SHA512ddcf47740f902dd83e2e0352eafedc51c3a23e88431b7185bcf26649c668ac37cf6fa02520b43044b1bde2edd0af6073935167657d655cc21e9c14f6bdd17995
-
Filesize
1KB
MD53fa1606bd3f3d3b5d19369195a7cc1b1
SHA1b6f09f69a891d462ff09eb07301be8833f20b3c9
SHA2563bf958b1e61679a1a4a93765ff5a78e972187ef02037ab41bac10dbede3eb8fa
SHA512df394c82370b93d12d2470db3ce57a30a876e3d331b722acecb8fd4d66cb24a9a22aa4a4aecd25c07b65f3b0298660127fc76183bdef9be23fca85df31c0b3e5
-
Filesize
1KB
MD5ced7b94eb3e6ed6efbfd04354b75f554
SHA1199f5991cf625c2cbffc065064cb4ee94759314e
SHA256c009c8530fe2fe78ead4861a453a77d40781253c54b900846b21eb597041763f
SHA5120474fd7c236922e2f61bbe8bfbcb9f9e8bba0671681088a356eaf635f98028b67549c98b5a17820842cbcc4226dea3c45b6bab221838d6aaea788ca65bfd1aee
-
Filesize
1KB
MD520a9e3bb348fe8de18ef76d3be9b433a
SHA178515a3e764e4d7697ec6da0d7215ea36838f07a
SHA256dd5192bb63475404279e6701ad9b69db58217db7f63e6f7ef93c89be5435ddc9
SHA5124bc80bdf5741f3698940958c8be4f90ee2bbfe282d5dc39fb09680c858864942606d211633cd8a39d8f95f91f73e96d7626d285e660203e3584068d7d12c6662
-
Filesize
1KB
MD54692f5e2f4feb250dbf8efd8c5ea0db2
SHA17ee402efb881f6d08accd338b57402a638c36224
SHA256e25ad950ae7e843dfc92a48e08aacbb7037a5a336e1a0a44ee5e5f326df937e0
SHA5128f11ba23ee1ffd3c795112664037fbfb07a023354327db0075f9c7604d1b59f22ab57ddd5167e471919990aa457c500f4cab8dd88da3b9e4fbe89c30937b5d43
-
Filesize
5KB
MD59428b9bee6b53e5a065398fe02ce3022
SHA1caf3f68f329e2453693db96328a0048b20221141
SHA25657583708a32f96a851c1f942bac779f96758f41b1a848fc86d368d16b1ab2bc0
SHA5122e24777756945841e8c4caaddec0dbf8492f9d1b6fae8280dfe6d094bfa62d76546aa8a264c776b1f96d23fdfdffabc772576fa5949d8117abba6bbcaa17893b
-
Filesize
6KB
MD59a81cacf24b10a5063f1403fea3d5f77
SHA14fd0119334a59785e30e5e1d4af32d3a56c220ac
SHA25656e9bff081761eee8a0b44f887b1a3ceb14a5876ba806148fbdc4703db7a73c0
SHA5124c4e0b87e76a3e695dca43c31970acd5426d513b30a0808640a3814a2f569c754d8eabc18ebe6bb79da1a50f54bd8ee19512bca550c74e791e09d53bc24daef2
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD57d3381930060d77b0398ca63bd7d0f6e
SHA189afcbcd33c3523ef173acba84af6ef46ca551da
SHA25670800b8692aebb427aac9c8de1952d07cdcb587505be6accc3c33d6c11e95977
SHA5129c95b43a5b0fe99dd547187236c95b52d9d492d3e71aaf7881a01c40f7619529c93c82b8075fa2e72623b7f4989676f2ea0c6504cb3ba0b36011fe27646b71a6