Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 17:11
Static task
static1
URLScan task
urlscan1
General
-
Target
http://[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 4796 msedge.exe 4796 msedge.exe 624 identity_helper.exe 624 identity_helper.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 5052 4796 msedge.exe 83 PID 4796 wrote to memory of 5052 4796 msedge.exe 83 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 2516 4796 msedge.exe 84 PID 4796 wrote to memory of 1692 4796 msedge.exe 85 PID 4796 wrote to memory of 1692 4796 msedge.exe 85 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86 PID 4796 wrote to memory of 2164 4796 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a7b946f8,0x7ff9a7b94708,0x7ff9a7b947182⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4330343417735441366,8345063495431065069,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
215KB
MD52be38925751dc3580e84c3af3a87f98d
SHA18a390d24e6588bef5da1d3db713784c11ca58921
SHA2561412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b
SHA5121341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD53d6c49f2ad2a3dcba544b0e3f7310154
SHA14f82b646b4896036c2c444d788fd00003336fbf3
SHA256f78a3694a83bcdce5b4230c84f200d557ed491d04e50939c9a5d1b6cebf6267b
SHA5126119b8c5ae3128d9edfa0a6732e5ab42403fa89e142ae5ddb8a8df9368ce14a919359bee15db20480930eb769b835be6e28895444ac0f629abe4e41aff0cf510
-
Filesize
1KB
MD5949975457c3b1e03e85fb04c7766dc1f
SHA184a7aa77dcd91854e6d06f1b46bd1752d2e98e75
SHA2566fb1e493ca438a713fe8e6f06b906dd922a1179ba3a3b1ea7dc965c3da34ff70
SHA5120b8f751c03172c35d6769a4af1897ac9356d31e63d015db218126a2f3daa57c153ef3f2db8079d1e6c6db89d93e99055393331036466900b3ad89a3739dcb959
-
Filesize
1KB
MD514986ded5f7cd2245a6720324be4fe2d
SHA16595f6ed51be15795d35bcd1e63c4a9d7761e8fa
SHA2566ae483f7cfc7d419c611cb05ed719b4fe48f70d26a69d7b8f4aee7e9fa1324c9
SHA51215e2777beb6f81ac489329b2ac13c685292e22a042f37d5e1a70b42af6fea897388f3fb392d82450e221efe6ae3c051a7cd2eb8354eef19949961fdadc956a90
-
Filesize
6KB
MD549d06e8c19a18d12ff753cdc90bf2863
SHA1cc9f696270eae0b58900e4814b9c9585202129fd
SHA2569fee184e160c7b681d688f735c0244ddbf6537d41605ee2f598864c91458ccdd
SHA51250fd5d042c6bc96af2401415ddf5590bcc357e8870e3243e2ff27494a6f4eb49beafea878ab84ebfd1f96fb13179b79d367b0abde6c68aee140580a7eb914776
-
Filesize
5KB
MD55217e1ef14ccc4be2bb35323774f579e
SHA1c10ab89d1d6cf98e8e71455e62008f63826e5af0
SHA256ef78ee2a917437b892ca342f57a721711cecf33ca51c2e1e5828ec6d054ff354
SHA51274ae37b1fb29d2122626039bbf2863d97818ce7e77f8b7d5a004e7457cb7da308834b41f2a62060354521739b7033a888865dfeff32c4a46226250d0bb473fc0
-
Filesize
869B
MD56e4a166fca28e668ea437e9daa3bf5b4
SHA1fcb70174434ee0c696a1026dedc73b8e9f8da3d9
SHA256de296b5f1ff9e7884b917e682978ff724d61dd22bc47358e171ae32b67313001
SHA5121224e323391124b341b08e3117f5ab1d84dc1cf1192fa8e2c29e1760571ebfb775c6cf9423e9ac7276337b521dcf17de4588f4caee222d8bbebb5aa59fe42d6e
-
Filesize
867B
MD51aef94a15ffe5c627aa3437ebe92c113
SHA123de3fbaf1e7b8cbbdf19e621c9507f1f7348691
SHA256ea2c182ba8f637f91d5dd2aa541248258f2a0e6334d99e6a0a302f0d47186142
SHA51278af806453ae75d7c410379550331f6412093badd05bfbf09e11a771384ba1a78483ee874234ab796ab8cd48b7e9f516f85507d069677f8a04d758cf33b8d2ff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5547e135a063333a1f43e8863feeb087c
SHA12e83cd94540e891fe0ba52b20e509fa9f159fb80
SHA2568ad7a58d00791cef837bfeb9a3ee88f2066bac0c9aa3d21d9ac52a0831fdf06e
SHA512186acec711007e0488222209a3aa41cb4c3fefcb76266fa93f0ea632a92a23d58e53535272de688513784da66ccb088286de3b0a18321e64b93b485f581ecad3