Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 22:17
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 1696 msedge.exe 1696 msedge.exe 1308 identity_helper.exe 1308 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1788 1696 msedge.exe 83 PID 1696 wrote to memory of 1788 1696 msedge.exe 83 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 1056 1696 msedge.exe 84 PID 1696 wrote to memory of 4800 1696 msedge.exe 85 PID 1696 wrote to memory of 4800 1696 msedge.exe 85 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86 PID 1696 wrote to memory of 3548 1696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://is.gd/hklkRw1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffded8446f8,0x7ffded844708,0x7ffded8447182⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11267518936018146542,13327356689916180312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5a62ce3741449e5046912ce4f7da06625
SHA1cbffc596ec0735a00fe07dc8276a5b064a3cfbea
SHA25696e5c78227ceb221a2c7a68bb402303bbf3b22aa9ec99c96b9827684b07f5de6
SHA5121ad413ca90ef2e9d88278bb8ac75fa0f814a7c6ada13c09d7c564e59ef5cceb2aa6c8a3cddace264dbdcd607315dfa18cd88d4922f454b86bcfcfff1103bbbc1
-
Filesize
5KB
MD53382fb2eff0a05d18ae64ad1d2898dbf
SHA1c778207fc3f9c99d592169b2dfc6c52d5111ccb1
SHA25629719115c3edea16ecf45ebedd0361397335d8ded641dfd9b301e3d030293069
SHA51268854732a1e2716c227d64ef64814bb56a817db1b75a9233f7d1a2f651bfded52916276a713a0399755588b5aee91ec37c672fc4eeef084ca954da0f846a6f6e
-
Filesize
6KB
MD5ffe0af363bf44c3a45da4487013f9694
SHA17bdfa9865965ef41085a538036978c19f0aeb348
SHA2568055739e03e9589b4f9915feb083bbcb7071484024a01dcb0568e88f5be5d4d2
SHA5129478ee5a0137575b598285fecc5dc9aa5a396e6eb734d26c7306a0ddc9ea8658eff4df371dec525d690faa70903aa263f73fd1f3400474d31cedf8e0809d09f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5afdbfa0c62998e90ccd3fda7ff2f3a5c
SHA18fbe642f94ada9d683d69c9e753d597bc350af33
SHA256d6ffb9d7ef12217d8c97fccf71be06494cf4af9ced090ad17eca7d2c32bd2a47
SHA512a23c399586805715cf9a882b3a9eab405be0b35cfb6abc7a6a0268eb537efca7f0d41245f858b3f837bd25bf881685a5250ac6196c9af90935d5db3e23c688f5
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84