Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-12-2024 18:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://macOS 10.15 amd64
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
http://macOS 10.15 amd64
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
http://macOS 10.15 amd64
Resource
macos-20241106-en
General
-
Target
http://macOS 10.15 amd64
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 3164 msedge.exe 3164 msedge.exe 3960 msedge.exe 3960 msedge.exe 1872 identity_helper.exe 1872 identity_helper.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 3652 3164 msedge.exe 77 PID 3164 wrote to memory of 3652 3164 msedge.exe 77 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 2692 3164 msedge.exe 78 PID 3164 wrote to memory of 4984 3164 msedge.exe 79 PID 3164 wrote to memory of 4984 3164 msedge.exe 79 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80 PID 3164 wrote to memory of 1140 3164 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://macOS 10.15 amd641⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe87503cb8,0x7ffe87503cc8,0x7ffe87503cd82⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1876 /prefetch:22⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2752 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1816,1736342986352541034,5281964829303997739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fdee96b970080ef7f5bfa5964075575e
SHA12c821998dc2674d291bfa83a4df46814f0c29ab4
SHA256a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0
SHA51220875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff
-
Filesize
152B
MD546e6ad711a84b5dc7b30b75297d64875
SHA18ca343bfab1e2c04e67b9b16b8e06ba463b4f485
SHA25677b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f
SHA5128472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e
-
Filesize
5KB
MD5d229587a752233c47d62b65aeca4bf1c
SHA1203987bfa1fadb564b336deabcc437f47e4efb1e
SHA2561594f3301738e27c7ee2aedd3789f2d6a9f6b1ea40a0c03c8ab7c6d409d1fa8a
SHA512e470d273d82bd3617342cf7be38b5eb6783c7b716cf106bf44551a24ea2823259ca0d9046995b023448b0e256960ee1ea7813ac8234df5c88a3efcd0b8bf21a0
-
Filesize
5KB
MD5ca0e3a3a30907bb6b8fa101c4938c4cb
SHA1e4600458595de9ee3175ce1cf7fb23276997c606
SHA2561fa33a770d04154d131299fe6d32ee8ea52553aa85593e168a946bbc6f349200
SHA512bb9d0f9c3c5b04434817d3ea37b49ecbaca529bebfe43e7a6fdc7b1d2b6a82cf91c353a675a8585f2d585ea18cb0ea06be2f6b6ee0800113222b600862bcb47a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5265208a91aba5470f97e8162ca7da865
SHA1fc6a2aa2fc37bba2c4f2c6e1149ec19d58186dd7
SHA256a99024a2d9b144be9bee8348e45c83ece2fa5c394e4bdcba666a92bfb8d4181d
SHA51256580876d62b8d0742825d445a71cab16542f20dcc8de115b46c831b07eeab4fb36bf7f5d75a4fce2d28c3186db7ba559e857439668b58fd353b194dcac21b42