Resubmissions
03-12-2024 11:02
241203-m5ff1asmdz 503-12-2024 11:00
241203-m4b27axphq 503-12-2024 10:58
241203-m27fbaslfy 503-12-2024 10:56
241203-m14m2axpck 5Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 10:56
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 708 msedge.exe 708 msedge.exe 1232 identity_helper.exe 1232 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe 708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 708 wrote to memory of 1516 708 msedge.exe 83 PID 708 wrote to memory of 1516 708 msedge.exe 83 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 4272 708 msedge.exe 84 PID 708 wrote to memory of 1868 708 msedge.exe 85 PID 708 wrote to memory of 1868 708 msedge.exe 85 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86 PID 708 wrote to memory of 1196 708 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://account.live.com/pw1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94ef946f8,0x7ff94ef94708,0x7ff94ef947182⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8081265100635160249,4300033418601917373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5629fd9a45976a2203a297e86a7028366
SHA1f4b9695eb11d28212cd55bc9a17d5f5d8e745012
SHA256af80b2192f7a2c0859dd8a873048426082387ef628a97bebe38fd9dfaf3df48a
SHA5128afdeef83ebc2c0b3a6c8aff5cad6305595dab85786011d263d783e8e5ba6b0232a8b8926f5456ccafb00aec7294fd5874d46f223c7fdb05907fd70e6cacc608
-
Filesize
494B
MD5fc74f8470b03db74c03b457934cf12a9
SHA1d03c8d3d4f0f73042415988ac211a5e31fcc6b0b
SHA25645510d5c3572617c51768b56f053c75492a66b22b902a04140e22a08a71e6da3
SHA51234c5b3033f48f2e8f9a572af5bc71095a8ae7c6dad34c0f2a7a890dd5dc654e840d977864f2fa10988dfb93af75e39cfe71f17e25c0a0d7d4e3c220bb84bd737
-
Filesize
6KB
MD5276a6e89701be21b49fa5596b9f91b23
SHA1e76f460ebcdeb232ca8f2da6fd1c42d6aba677bc
SHA256ebd85059c9605776259fa9ff4ae7cf56b92094106ae4dcbad258998ff75e49e9
SHA512cbf722c8e67922aee1ce9d7af432e113a43070290609370b197da106a112ad9e4d67ea6f8ef13944784f0e17b8635692ebdb783c1999a547d503e9416546aa7a
-
Filesize
5KB
MD56907c72df16eeb9ecc597cf0d1f1de41
SHA1eaceab5a5be22ab4323a143f996c197a4a3d43d3
SHA25698eec0e4dde7a9dcba71a7561b1607849f46cce2ed62de80721cd08826b85add
SHA512d82e647ee4f351b4e598539e92456dd23b8fe1099e69dd1185a8a25ab0713a38ca70e38620980e4dc5f0d36e445fc68690a6c38b1b1b5001a018f9de5c4f54b1
-
Filesize
6KB
MD50b6a2b74eeda66c2c04d77f61881e411
SHA169f6c681765c180188a70151190fd921d079d781
SHA256b0f830768f3619837e5c136cf291e79ca80c2d47b0453d523af22d043077da19
SHA512f5a6c887349c5bb013182f095b0cb4cd1aa87daef8978f59b92ec9c77cfdc5fc9c0311ca9f8f5f400464572d5970bd73083bab06020963ad61a739804fb6d54e
-
Filesize
6KB
MD5ca00e664a3d85e2cfa0428968ad1da21
SHA1d1dfa8ab22eda1d08a1b4a44ce599d61f967f849
SHA256d5630f7f7fa61e5444bb0eca30c6cc415f908d9a4f5b5ea38d3c824d19bdc57c
SHA51241fa31f3994a75e90b5ee89b86d49803b59c3c5332eec4f0b71398e41322f9aaa91ae86e2119a9a7265b0e6ec434f7a658278c1ba74ffcee5d634a4fb2ebe8c3
-
Filesize
539B
MD5fc3bb4035746f6e7115e5cafb10dc9d0
SHA14597681955cd1ba4d77943619532e30526e78f3c
SHA25608fcc4506d23a024ce8749b668ea60d9d11d55cce6c3a7a879d722c02a14bf11
SHA51227f8b990c125bbcf897750f03a92b578ad581a51253adbb3e8c14f4e4c7366b3356c47dc7a802205af675eb2613d959d3ccaa27b30e5179ec2b3749e789f0b42
-
Filesize
371B
MD57ccdfcb7e5ec9c15fc25cc97bc3bc74b
SHA197c6ab777045b6acd1b2c6095b3249df50dee55e
SHA256930faa7256fcee094776a642bec29ec88e33eb6888d4c5286e1e4648ccbaaa03
SHA512c23b64c69671f4cfe3af412354cd1128877ad1ea46a5901e150eed50b7546832960f199d8f2b89a80531174acfb05ff7c0eef641ed360e47998af850068ab829
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD50646d2f5647ca3f5769f4cfe7d35cd3e
SHA1b4c07327be9714d55c5cb29af74287740e4a9c7a
SHA256b31d7acb681ce3720dd037f8cc441af669047daa5d163a67f5e98eb125c21174
SHA512f2a04173681da84adf31f4e6127fdb5f56affa646b5fb20cfaf1a42ac5cc1783d1710daec31ff55e83dec47bae73d4f5d49f7c6c971af43552ab0edca1b8a40f
-
Filesize
10KB
MD5caaf097ead7541d078d0374105b4b10f
SHA10d4014aba13c5c23410173a5d98e6528d750d263
SHA2563875755cc3a1c5a9dc05779c03e14bbf9a03dd54dc49d3edbd3fbb13580c23d1
SHA512a312b9485ee9230e11fbd7fc131d643f22d252c663054ce058edec45bba470e402085235318b0cdf66d6aa493be03adae75496c9ef66800be010719f0f2cbef2
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84