Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 04:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://t.me
Resource
win10v2004-20241007-en
General
-
Target
http://t.me
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 4368 msedge.exe 4368 msedge.exe 4624 identity_helper.exe 4624 identity_helper.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4368 wrote to memory of 4840 4368 msedge.exe 84 PID 4368 wrote to memory of 4840 4368 msedge.exe 84 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 2064 4368 msedge.exe 85 PID 4368 wrote to memory of 1944 4368 msedge.exe 86 PID 4368 wrote to memory of 1944 4368 msedge.exe 86 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87 PID 4368 wrote to memory of 1624 4368 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://t.me1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefb2f46f8,0x7ffefb2f4708,0x7ffefb2f47182⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2140 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9768356374283550178,10265712937598930340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2fa97ed2-dc2a-447d-9a24-f39bbf041e4e.tmp
Filesize6KB
MD533be940457fccf8f1afc33fc76cc3174
SHA136ea0a287b74298f94ec5a03108402edeab79aec
SHA256ce8585646402d9981057cf91b3dcd065c339832dc26f09460c84cd3d5d542188
SHA512a8e98bcb6144e88a30e4aa3b3a07548a60e434679ad5902f811bcf0a62cd40b6cddc16c0707c20dd1738e52745c03b8e107071ed022ced6633cbf9ae3f2218ba
-
Filesize
30KB
MD5348c832a4560adebb39e32b91f392e20
SHA15f8743e97e3d0c418d90998072416705f17eb720
SHA25632339f355b5b9b8693f9f6370dca7b05fe6042e3b2d94546afa05d569dd6b66b
SHA512c225d7794c5c01872bb1af8a0c6af443f54e07f40cb8c03ed79c77a092ab35e03cbf29e2672cd070e93c998f54fe7776f4ff4e948dfd67af8d77039af6638cb9
-
Filesize
151KB
MD5c798737fd303ec814cf40d8076bd5d5f
SHA10d18fd05f16c17652468175fcc41423a3d99170c
SHA256a8e7368f03b24867920b42fe31331acf8bde1626336affcee9bd6a9d7daf0692
SHA51231ad0a4e439b706ce0da3a541bad7ed5e5340d086bac526b7872ecfeb722edd9767d99baf72307ae6f79649e3be90542e9034b618dd75db7fc46c19eca72da35
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD55bbde2f54778a37eb5f3a1c6191e0014
SHA14e275c2a547d245cb6aea2c0380eae36f163c319
SHA256b729221f9a3b3ad953b9e5887a9e60bf3fc646b4acc0af2bd3552fbf65f7a9d1
SHA512fb6318ea89a9c85b5fd0f2491eb3729d6fd03209c06e20e8cc7d9fe874672e9b6e72a9d235e429f67fccab2c3d54ab2aceb78c57154874404ca766c19c7845ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize96B
MD5dc5628b0b62f50812aa6c82d6b16fd60
SHA16029caedf6ff87dda21aeabebe35c0cf1a52f2f4
SHA2563def172e9ac4bdfa7afe0393ef343af15f7ccf7272338b8fe1c1b0acaf9dd7fa
SHA5121cd92130363c80d3740d53237dddfd84016725b346919fb872f65fc0adc9849d5cf2eea785bd143567b11fbe74fef8d1d759bfe9dfc267c600e9e56c6168fce6
-
Filesize
242B
MD5e384a795d1e597feb0a5bebd13dcde50
SHA17ce66637789b61ae163c1de62dc996a99cdef796
SHA25642a6ef02d02be95231cee980c97d4398ac167e7264a5cf838b3e3a2ad2a3380b
SHA51236f58ca4b73ed5fdfd9b2557d09203189dc9cb3db29ee9716f89bb75a8f6d1c32cca67e597dfefb3b9074be0a024ba51ff40d8024439ccbb16d17316abc2215c
-
Filesize
5KB
MD5699cf977c5d865eab29ef174363c4013
SHA12e6b8a7fe09ad55da135c7dc42f8f4698b519f8e
SHA2565d83631c40dcf7f4d2c864dfccb120c321b53bfc0eadef77a912816d88b5355e
SHA5129daa4ddbe292c9d63afcedf68387dac844f751d1ea5b317bea2c0bf834bf8c4ff20c0546430fab12f8064fa32c185038238df5f08d66256d62d52359618693d0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD598b28b7662f2e710b5df8b801a5c4656
SHA1f860c447e2dc2ab00d466ac8b741d2d92755598e
SHA2560bda7c79b2952d06eaf815a4d226630386e23565ab9264d84e9605e45788dd2d
SHA5120f83d2da2c91e3287bfc2391b4aaafb32d51b13ded09b57813839ad39d02ab31fcc7f8a8fed04c2641539e57f4fdd812939a3fa63f1bcda9e3d4bc991bd7dd4b