Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 17:54
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 968 msedge.exe 968 msedge.exe 32 msedge.exe 32 msedge.exe 952 identity_helper.exe 952 identity_helper.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe 32 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 32 wrote to memory of 3200 32 msedge.exe 83 PID 32 wrote to memory of 3200 32 msedge.exe 83 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 1496 32 msedge.exe 84 PID 32 wrote to memory of 968 32 msedge.exe 85 PID 32 wrote to memory of 968 32 msedge.exe 85 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86 PID 32 wrote to memory of 2628 32 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://a155.warmickmak.ru/PrEvJj/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83d6046f8,0x7ff83d604708,0x7ff83d6047182⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17975562320990672526,17976498315169405536,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD56ce4eb725aa25d913daca3ec72bf6d69
SHA1902604652365e6aaddd8c9e012398cab2ae37c64
SHA25679e85d50e1e8eeab1fe59c805affa4e7022c767183fbb41507e0cc35630a3533
SHA512a51f4229ce911633e86aae23fd2ab078b7736968f2e094462f5594571a5f353abb7b694478792972572d6ef60ef5721a14ab447d8071a00fe7c679a8e2e50b52
-
Filesize
1KB
MD576f5c8b9ae3e7e9139dc608fa4ced1b0
SHA1c78cac2a821b76f3df3ae4bd5629f9fa77f61fab
SHA256df07d013474013b176eaf15d2e61bb05703682633a6ff1cb62786a3ba2f3f3ba
SHA5126279a1b2bff7d6eb1ba77bdea1a044f7da675e1e9e44ef5dbeb4c77d4af9ed9170bff3473ef2d334db64f9dbcefc1a334ed4fe01555f2985b1f901ccb512b0db
-
Filesize
6KB
MD57f0813c1b3d299a007ee9be20d92b9c2
SHA1310c861225a47d9907bf9bacc75f8c6794c52210
SHA2564d4b78684f5abbcdbb1fc309ab94265ba49a39827ed754d41a25b5f72087c902
SHA512b2e878e7d81b74bd0b510c862d7eb77d7415e7b8b08da03bfd389fc0f458769ef8c6deafa4b59c2939f7c8a354972c986a29b262a79ee9bf879baf8d5fe6754e
-
Filesize
5KB
MD512bb9cbda63bf34066e3bc2925a131ce
SHA1cf4f31adcaf1a6caaf9c5953e59e08ed0ed033b7
SHA256a510bf5f6b04a2c7248a75aca515f8de291e927baa47eb2f34b110dd23db0e3a
SHA512aeae151c192fcf11f2b8b37247f57bdc2c131b64959acb51500cb9d1d2f959bed27d693abdf01d5bfaddf646a96e959d1ce079d47d0a5e35b413819c00929048
-
Filesize
6KB
MD580c0c9c3425b0ed910d46879a438df46
SHA1b858e033d4e0ca46c521488edd9fe67e0f9d1f9e
SHA2561b8d01d849e16622ebc173e3bd2230e503677d981ae24ad63491756259b22322
SHA5125bad5a37a9f55c4810fca204f1d90339bb14518a4bafaf52a020a3d064005586ec1ba1f901936306ca83a92c40ffc46f7f014eee5d507d4a3af0d1852be5d688
-
Filesize
1KB
MD5399157c43e80cfd4bf8545b2688f4772
SHA139aa76480f10500a00c38bb9f195e3cdc320a531
SHA256cc8d4a62c447b5a18eb9b54ddebde5a9fc9f0eaea38dc61b164e4f44408183d2
SHA5124ef15f0f7fe9188768b18234139d2fde63588578163cea1b04bd9923ad599a7786bf0a94b00127a329d92f04874e779dca4256cb923d781c4d5d9d0577a5150e
-
Filesize
1KB
MD51747bf5568123cb78a582478b9bcef99
SHA18428e20e4f8e37d5b6059460d370c7b7a59a0b26
SHA2568c7de39325295e396a211496fe3a5f3b7508da1b41fbb28705a6ad11b6f3a053
SHA5120fb8d79435dfea3a158b93c54a9416607bec25acaaffb55b3b15e4f0a29c4a252552b374f2e41e9c40cf327d0dfaecba11811323384f634412f4e1276033a554
-
Filesize
875B
MD5b12ca36f7dd4f9113f7e808a0adc2a77
SHA1d53d4507b4bf6c605053342c163e421b8e315f7a
SHA256d3e4a515f0dd273e252b11a1a8be951b5d31d0cdd75e907e1709f86dfe79d4f8
SHA512ab2c6ca3084f04f83aaf44f6ec7ed4804b2ccf5e4f4dd1d6187d9d91f22be42436394a625cf84b771d66357b6d45865122925763cc188ffdf5791eecf6df07dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5258a42f1dd9a176777d34c9d2d75c5a5
SHA11aed91ee00fe839c7cd5e12b13c1b32bf03ebb91
SHA256fffb75bf09bf49cc8749b4a12a3119ec176fd620afa3c90ded22181b823bd9f3
SHA5120a607d5f1759fc18d519b58f89fe6d95fb0315b8c67ee3d113e1a1cb1c4e2b40f487eb7f1ed65416010aede80aba3eeadc8018e75cc4f942aa1ac345599e9522