Analysis
-
max time kernel
52s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 21:27
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 3772 msedge.exe 3772 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3772 wrote to memory of 4344 3772 msedge.exe 83 PID 3772 wrote to memory of 4344 3772 msedge.exe 83 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 5016 3772 msedge.exe 85 PID 3772 wrote to memory of 4360 3772 msedge.exe 86 PID 3772 wrote to memory of 4360 3772 msedge.exe 86 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87 PID 3772 wrote to memory of 1060 3772 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://outlook.csyii.duckdns.org/qaQuPSkb1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde21a46f8,0x7ffde21a4708,0x7ffde21a47182⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3677924307254234885,5578034331170244787,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:2848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5ea4ebf010a65085f2c015fecb7dd6ea4
SHA1ba3eb7dbcde8e53ecc5af9d06a7d296d76dc9413
SHA2565bd0663e217e1c149ffd71bf0ab323a0a61e31c2e47fa9fe784d3ecb5ddf7f6f
SHA512bbc8d6cb4245022d4f00320f6774fac2bf1b14dbba8c1bf52770fe21f3f8aab55d79931ba5bf3ed5b7c147c34be9a54e5d945b39d8692b8b83da8195d39d593c
-
Filesize
5KB
MD58d82ceed7eb1c1b64f3081ca7138a853
SHA1811cae1e81259d7c65ec8217f923c96c9189dc0c
SHA2565c189ee37cb4d713285937f56a35154f8c080a9e562bd73f1476bac401a59870
SHA5127a913fa8a8f5747a8f25c86133c143746a6668250a7ab55cce2a45d482316fcdd68778132b5d1672b4483a3109306b2c90c29fe7c3ce8c0a0ef9a005ec0702b3
-
Filesize
6KB
MD59301eee551e3ec63c0d90e6689a108e2
SHA16df9a1dcc16f819e960746e183a3d6ecb3e8310a
SHA256e7113870dc292a89c506715e5e8b52dca800ead058db2a70c90d7f2c1387d02d
SHA512793e470941bbaceb48fec3c372227d4483aee22d4ccdeed547abb4e71e6271dd6da46433d9495fc45478bf0136e3645a15e984b186a9cde9b77181b78f1cff27
-
Filesize
6KB
MD55b83ac1b5a3566307ed523d3b7acc91d
SHA1e667e527ba18f7878076c2a0478984aa176c9475
SHA2567fe0e950914f083974bf7be7ab796a4ccc58ca623987b54aad4ee5c1876a7c42
SHA51208d37fcb334feb02fe064c846a20b2fd606857b5b79520ef6dc70bd1bc0777a011a4cb71bd930e8e0a4b2a263d3c9fe6094b0ee598b3ef6c59662e9bc8cad954
-
Filesize
871B
MD5d030366613e59afb00ce95bd751ef88b
SHA16c37f2ec1c4e4cc42a0dda8324bd8bd02f63d367
SHA256d54520a838a023ead510d010b4e996ae6711165a1288d2a872af0fcdc101b9d3
SHA5121e8d311a88fa48fca18f8bc054de6098b689e674076889f79b44945f50354d68c448a790321712c641f3648066a4343ca6a0fe3c2bc549da7463c4a58cb98a0b
-
Filesize
204B
MD54c7dda1ec4d4f1e582671bb8cfdb637c
SHA15cb106b11a79157529848d539d920aafb32c8d6e
SHA256cfdf3c9a8569b778ba55240a82b9775886fae72125cdd7d281bfef43544baabc
SHA512208cc8e8f4c70c78010f09bd84a2318d4b2ba1076c39e8bae92686600f3d6421a5fd4ba6ef13639c48d120c02151c5be6c10f1c5d71705afa88da5fe1608749d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fb287273bc4a2553e0f3a3d79ec9d950
SHA11ba644ac7f6b4e7b640a34d27c5919a9e7109dbe
SHA2566833945dde5bd5c05eddd03b0d6b5ef6c7d12dceed9c0d7769f5845eb349a4b2
SHA5126f6b04dd82c6deb47cbd71b7de5f0c2cda868091a1a28a568b30a354192e3fe62ef99d6a58f0defb19cf8edd7861e3678b6cff0c17293c17930433534308177b