Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.magnor.se
Resource
win10v2004-20241007-en
General
-
Target
http://www.magnor.se
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 4844 msedge.exe 4844 msedge.exe 3296 identity_helper.exe 3296 identity_helper.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3032 4844 msedge.exe 82 PID 4844 wrote to memory of 3032 4844 msedge.exe 82 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3436 4844 msedge.exe 83 PID 4844 wrote to memory of 3688 4844 msedge.exe 84 PID 4844 wrote to memory of 3688 4844 msedge.exe 84 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85 PID 4844 wrote to memory of 704 4844 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://www.magnor.se1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9396046f8,0x7ff939604708,0x7ff9396047182⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3480 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,16348884817944118706,12398846196976523576,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5cfac308b0f0981894a196cb3cf6fc6a4
SHA1f9959273c8aae7a9d10cf75b5cf5452a700c1e45
SHA2566ce22472a95b28912a4f011a94c0a1ae01745c8f0c88dac01714c2ac38583776
SHA512ad6d1d38975ca9abd4a53af73e2754813542fefbe947689dccd01f2e88d79b9cb385ddc27ee8175bb51524b302b4ca22a2fe5fd7decad1fbc1c6afef2206bf74
-
Filesize
3KB
MD54ec28117c2fe2f3c7177d823f40e8e59
SHA18b5b9e65f89a6cc90492e1ee5e0927f432b6c9d5
SHA256b3cff15757de2b2b7ac11d9169733b91a5bab934e2a63123ffe6e94a5d877dcf
SHA51211db1e35bca8332ffa249bdb7a5ebdb4e9d507d2817ccc3c6a4fc70b182b7abd2ea272285c69e2987b464363b7b18bb84440b4a8f0e3c3d186c1070ed78e3936
-
Filesize
7KB
MD55f73cbca510eb840c21c0f371ac30afd
SHA1e4fafc6e37f72043d37d92f99e93df8830936013
SHA2560332718d5af1fe743174b04faf86dd51d97acbb40a625a09a97dbf708f04893f
SHA5127c382a9fd15fe79267a99d883563e9b143fa7b2eb2c295bdb0e37efecc4d76d3303f0a4597bad0d40981adfb911041f6f536b569cf90c9c3c96a0767f91e4bdf
-
Filesize
5KB
MD594eb2c3c581bc9acd42eb3ca58057d53
SHA1ec47e615ebda031e45502bc8e2e0de7644889aa5
SHA25623dc0c50dcd405e31ca842f53c962783c87db055ff57616b8e199ad7e2cfae0c
SHA5126ec9e84d820733cb1593e9561f37758f114ebde9e3044e9ba531c4ef855a46b6fe2069f4b379abd46ce5bcbc0f596f50f9c85ec62fc79326d9b2bf9dcdc8c838
-
Filesize
7KB
MD561db2461060d2d0588aa90e939db0f7f
SHA1a2d193016eb6d2eef8e56ef29075acc3b60bb600
SHA256aa214c390b8624cc081e0c94138c0894ab19eb6e68595f8b95f00f4afb1e9382
SHA512270ef83d176302b12612061de4c660804885e5a019d0532e107aefb241305579522768220863a1c83f7c13423e5c05757e0f0ac74606008f66748324292a6f62
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55c4b172d9f9abefa2163a2d608f4e6f4
SHA1b241279edfeface11598a2b28cb04a6bcc369a6c
SHA25608ddef899cc920ba8c3fecea2ccc51366d58eb7120d22d6dc3cbc5620551a008
SHA512b25c3a181d7573c7fa8e45f6592de9c1d99a6afb0f35e6cdb58849845d9f59c57174c461407766c6a0e61967ecf63da05d2484a7d7db6d77cd4f56e3dc7669e2