Analysis
-
max time kernel
41s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/12/2024, 15:43
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 4760 msedge.exe 4760 msedge.exe 3448 identity_helper.exe 3448 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4388 4760 msedge.exe 82 PID 4760 wrote to memory of 4388 4760 msedge.exe 82 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 1208 4760 msedge.exe 83 PID 4760 wrote to memory of 3652 4760 msedge.exe 84 PID 4760 wrote to memory of 3652 4760 msedge.exe 84 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85 PID 4760 wrote to memory of 2716 4760 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=GS6F3V9WA23481⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff764a46f8,0x7fff764a4708,0x7fff764a47182⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7615487078241814121,6298335110712461064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:2628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD578840ce6510878524c6eaf770c288725
SHA15f3804e376a6009b498c7d1d93271624468f1d29
SHA25665e8c2ab99d2545c20162f92b4336a3bfb0367764ea8ea16f461f692e5d2b91d
SHA5120c1ba713753a41de0ac69fc6af5b1db028099cd9ab018060fdaa7b0bf423a38c3390dd2d73eb4f73c32f7852ca861f1a5654812cf233988a0808d4f584c2e270
-
Filesize
6KB
MD52903240e6c526c75ae9b576a70fd6f35
SHA1fedc2f7fc18b6e511816a156cd2262a546524201
SHA256f4550624f2dbc38fa924c8bb29fbd1c5c6578804df2f9d0d54bbd9537ee805fe
SHA5122dc571dcd7655387016752df839a51169bb04d7174a8de6481567d7a57c25820b50ef9c683db28cf2d037707d26243582ec0807e4a5f628e171871fbfd9b2e6b
-
Filesize
5KB
MD5cc3ec7fe97b8385cef44a19716d7a168
SHA17017981d58eb7f2153c7cbe8470046b1be9297a2
SHA2563b21be9c0dfd9082181a313ba414e71ec3b1eb480bcc1cd2c183933b6ac8a37a
SHA512edfec922928242ef95ca8a7d80b1d12a1e1775dc46193bd9456917feed5a13b7724e2f723fa010214473a3d1d3a018a302152a082f0cfb3813d617b4ac13df05
-
Filesize
871B
MD5b63ade9d893151cc34a6e353b60c9826
SHA12e78809fc0ce2ae072d97a4a746304fa98ad3058
SHA256d99f349c9a5e469ca1435af142d58e09ff78e4c513cf639a457d66d486832ede
SHA51283aa9e9ea4d83a5b7ca4740b4ab353a1a2e7981ee62bd11d0a23b2afb6b5065eb472de0c0846bbf6674bf24ebedd88b6b4c2e1a80cd8376e9640c3934a3e012d
-
Filesize
871B
MD5de17250f59cad0c4c9bd2b4f57784fb9
SHA1462e3728cfc52bd1c3c571edbae0aed1951c58a9
SHA2569a781350a53f77a1e0efee153b9c59f386c70423efaa090120ca454c8fb93216
SHA5129b982193afd84694fb1d713e1e33e36bd81d7fd9c6d259c82636f1f727e8465bd3cd0a8f3d1539fae78bc63c882200d7354eb204dbf4e8cb3353f189e3159650
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56f1648a3e8a290c3b8fe3d99036ac885
SHA1b133e41f483e11f6869f8a44217add6bf3e9f93c
SHA256ae19e31d6065f0c88320291a713fef03fc894fa878ab9a663f04bcdb991094bc
SHA5128085e9982e1cf15fb880464cd8c4a536b615a0f13b8dedefcc437dad42c42bb57015b18224f58c745212d4017bcf365be8e22e5f4aada563a9ad8b8b4df2f0d5