Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 09:26
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 5088 msedge.exe 5088 msedge.exe 2544 identity_helper.exe 2544 identity_helper.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2680 5088 msedge.exe 82 PID 5088 wrote to memory of 2680 5088 msedge.exe 82 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 876 5088 msedge.exe 83 PID 5088 wrote to memory of 2412 5088 msedge.exe 84 PID 5088 wrote to memory of 2412 5088 msedge.exe 84 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85 PID 5088 wrote to memory of 3264 5088 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://steamcommunuty.ru/card/activate1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0c6c46f8,0x7ffd0c6c4708,0x7ffd0c6c47182⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6370638662799558505,15541731851492144306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD519396e7a438c8e4bd4218d7513a41b32
SHA13758b3dff891e772b15401141823ecbb0add7650
SHA256a3c3233d3ca5f5f1b97fb8bc5343ee411f02b1c4918ec6143d6ebcf868d7b151
SHA512bae6deae79a66c09eaa5bbb8fa92e9cc0ce8f132a5df159d125b6b88783564f214cd6072b5689390c954c34c94dc9e3b083e6cfc3262de1e6f0980c78d35c24a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD5d4156be5b92bc4ac163665636fba3320
SHA1779ba6975a08598927a243d7da15a881d6e371bb
SHA256245cbeb6971c9fe5eaca41f5fd54153c68684101261f9db579bc19c70172b50b
SHA512c3096f78702a59678108e64d3e01cf59bf70c3ee0b3be12dbc86866f32c0515e51a9d58a90820e6913f6969e7b53dffc3469b61fb627e2fde301eb73d25c1b93
-
Filesize
1KB
MD5acd771c334cad0da692b1bca35cfad68
SHA1782cd3666f973a3b00dffda8d98719a4f8e55dbe
SHA256821825caa5f2a7925d85da0f598719b45d2b1040260693cac5a3a3100d8e36e2
SHA51263e874b9bfa092dbfb6089224b1ccbffef57b2aba710bc71c282ffb2236f30b526cf61ee21d038eb677453a0bee1de77b431b28510d8ae29c43399929206e1d4
-
Filesize
6KB
MD58ff2e85512257d2bfde207957c16daff
SHA189d91275b8784c014026f7855f71d78e754fe159
SHA256606aeefe103233f2664a45d33f01b771c5ad761101c66f90c3caa952e0f46b5f
SHA512e5abda15ffb3d0692e8d069ab43c208efc567217617a457265305ef2fa66d8e8664c98d852ddd3bd81a09b65b93e1818467e8ae6a1813c97a922f7108cd35152
-
Filesize
6KB
MD5de3887ff9a43d549485d146ecaa240f0
SHA171abee5c1fe51da93cbd69bb0639e8073e7dec50
SHA2567ba050bff96b50f9880d1e4b36d8f063576095dc78255e6b42de4a1284f81259
SHA5121afd44238e1f5f6fa77e3778f0998912282bf053e69dc9f5519cb3113331f619e447bcc8ad11470078b0d9e277c02586da2cf3e52fc08469c3613b635a45c9dc
-
Filesize
5KB
MD57a321f9cb857433588edee2bced38e4a
SHA14d68cce23ec337fefce7cd983eb7bee113ee2291
SHA256be200d3b8b687174e00846eb69fc48939f800a805dd56f0d7c0057fe2c3c3cda
SHA512a551deeed975f47baba6c81644de72d4c939de2bc2560729200d4023b4e62df001cb4cc5f4733134e50726f9f2ea9db6488bd4b6abc4a353e90fd2ade5ba4050
-
Filesize
1KB
MD55ca8342ce7e570c4373584f13ffd9108
SHA17c73b160e438f7f8070a82d546201cec4f90e180
SHA2566d4ba1303259c21ba9b8bf355b2b46a4bd87db4550be01d247d054170af479ab
SHA5128191f6c9ee7be371dd9955fd7aeb08577ba3b490658c0ce3f16559ba50a807b39e78b546f37eaf5c1a8014a16362e3f9bc46509a4e337d7696dca28c5866ea2e
-
Filesize
1KB
MD5742220baff2966261ea4e3b9ff0aa3c1
SHA144e06af18ae924c77c5a0ad6e354d33fe10facf6
SHA256c609aafaf80f2a11074bb7387034ef76cf13f320c706b7870d780939684aa48f
SHA5124df8e0dc16a9879a70de46424fda71ab0aa0d57a578bb3ce067249c8556602adfdf59fc3ae201284c6d57dd17b894104903ad7c29da5cf7de8621163e9add844
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f1ce77b474f83c7220da822ee0d3b676
SHA1778ba4cbf921320563c66c15d9be453257b5f535
SHA2566914783a48439cbd95396580eee9fe607c8b86c60592fcafde37ec474cc6a1e7
SHA512877fcd95c1724dacac5e8eb540e1e1d7c84fabbfc2231d81aa49857a1bdff7ae560e960931391ebfe92eb1580654f4a4c277efe37f02e469dfee4753d59380d7