Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 15:35
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 228 msedge.exe 228 msedge.exe 2500 identity_helper.exe 2500 identity_helper.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 2416 228 msedge.exe 83 PID 228 wrote to memory of 2416 228 msedge.exe 83 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4964 228 msedge.exe 84 PID 228 wrote to memory of 4392 228 msedge.exe 85 PID 228 wrote to memory of 4392 228 msedge.exe 85 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86 PID 228 wrote to memory of 860 228 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://is.gd/LpxNZN1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2baf46f8,0x7ffc2baf4708,0x7ffc2baf47182⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1883814743739511410,3475187703824579798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:2520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5646fa66b314ce982f7c0e5da0af8af99
SHA1431d6a61461fc3ea19d06d2db51f46234a90465f
SHA256e4f04d319650436ea99a1f418697dcaf29c6b09a4b1c7740bb6b80f8a1e995f3
SHA512469a3aa83ed53770ac5d55781ee312c66f7a155fb6ef8c1d9beb3bf48a24bdfcab83edaccb521b4d729424661b3e2590e9a95d0528de5320ab82989805cd91b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5992770118f712bceb51db2f5817a7c1e
SHA1b41443d977c95805aa264e34077881e73c1e6667
SHA25667833c4622e80e7bbb75f160fa74935199d7cb442edab751f70a0a86b101f33e
SHA51208705753573d2c68bbcded0edbb6eac7c74d40e986503bc16cdf38c4a078377a898722ef527030af4072802bc53ba45929e1ab3eb77ebd4ee2c8c5e29479728e
-
Filesize
688B
MD58b1f1d5f5b05f71fb43b388b5a24eb85
SHA1cbb96a95292a7c689d5ed27aac9f919f3e2b72ac
SHA25666e1d49e329f3a55e2630966988e3b72a355052e7d56eb7fae90c50c9b6264a0
SHA512a893ddc350da24b8a45d2d6f24199c3a468323c6bb47b5aac0de2993c13db6860dc4c3eb74c5ef6854e8b5a5be03ff92ede0178aa476ac0abce2fa2c11d7daf1
-
Filesize
6KB
MD5769f0ecc3f11f5e925e8349455603fbd
SHA1c9c708033a2175f96a35edfac119fb4d3ff9ebe9
SHA256b86c37153f7897322384d98e5e816b036baa56847d54c3712d79275e4f059cb2
SHA5127841696b2e037c2eae0fd20172fec1b379400712e95d6b8c61d294d7dade1987da20cde3c9425342842ee7e8fd7bb677dd4dc0d03b6d83f75185535488235ca7
-
Filesize
6KB
MD50de7c7772f7aed4829f5418c6d35fcba
SHA1854eaa76a218131f05a8602f40dd74394b62b854
SHA25613bf2b00eef9f68766b2c024d6c0c87a44ccc21196de07ad481849eae3b0d2c5
SHA512ddcca709286b307366adedb512803fa4dfab328287aa058b922bb41efc2b6de245a89ad227aaff3aecaa0fe24f0a13b7b1deb191eea662734b9534a847eed1b4
-
Filesize
5KB
MD598b2ba031b9a65aafecd0a3d4987ea8f
SHA1003ee1cde63c7527d71093133dfb6f6be4c17f11
SHA256788f82c49823289ff88b34d2467a8c81b543f78a8d6358a935c027877225ada9
SHA5123c3e4f0f0a8b47a391d27b62d779ad5e11651c31b280995bd9c86ab01b0f6686452cf382dabab9c2a3395ff074f946716b225d4218ac0c2f0cfae1e58b61077a
-
Filesize
6KB
MD5fd2d254e63a1a3061a1e179ba7f6353d
SHA19b76e5ee22a206d10f4715e2b06d254f044dec05
SHA2565547a6e6cb78c52de824f7172dee6aca9657b1eace13e72f5a837e2394baf460
SHA512fc6ead14de75133cea4d4996c1d74083ee28c063d27352b8905e050c1d2d5dc0f6d5e6d1bd16ebcfede59d19fa82c99c22205e6aeaf8c645a37453220952bd52
-
Filesize
536B
MD5f8d6c49be430003f6b03e53daf074d3d
SHA12ce128bbccd3c1805f0505470720a61e211f3c18
SHA2564622fcc35d0116735195c1ef721d91de27eb852b90f8bb80a0880758f74f7294
SHA5122f451b221a0dd5d71ed4ede554ab7a14203d1883a8bfb1e291a05191d40817029104ae8f692747d01212009925941c54669ebd1ab46c25a86afd0e87e89c3200
-
Filesize
367B
MD5c05895d684f1c567c02ecbb0787c3580
SHA1b8bd1acaa04673cc66b6adf0951dafc136b7838e
SHA25666a3e3ef048aa99df68e1de116f9011f3fc2cdc710f46c3e23bebdafc8382f17
SHA512247619fbe4431c3791e995d32b2958f477d8470c5478c6c085d341bde3b45867e10534b8d75591994c68fe5ebea1fc649261146620267d0548fa35f28ce717d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52462bed8ff1b34706772780615486002
SHA119081a17ae1686309c95a03b5eab753a06a0e45c
SHA256fbe67e26aad09eee6c7fe7e6506201a8280646fb34bf857daf9b6060334f0e75
SHA5128ad398c71b857ce4def34045d3449a827ca9c733228883c26f3eabf1c7e34546d7f4da1524fe0e9d405e1ffd1802b724c9a503e1b0ee193d0ff92accb76c6665