Resubmissions
17-12-2024 02:08
241217-ck2hmaxrgk 1016-12-2024 01:58
241216-cdtt7sxqhs 816-12-2024 01:44
241216-b517xsxmes 316-12-2024 01:41
241216-b4dp8syqej 316-12-2024 01:28
241216-bvm8bawrfz 1016-12-2024 01:13
241216-blhw8swnas 515-12-2024 20:09
241215-yxkarsxkdn 7Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 20:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://noescape.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
http://noescape.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
http://noescape.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
http://noescape.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 116 msedge.exe 116 msedge.exe 1752 identity_helper.exe 1752 identity_helper.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 3084 116 msedge.exe 82 PID 116 wrote to memory of 3084 116 msedge.exe 82 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 820 116 msedge.exe 83 PID 116 wrote to memory of 2812 116 msedge.exe 84 PID 116 wrote to memory of 2812 116 msedge.exe 84 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85 PID 116 wrote to memory of 4580 116 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://noescape.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3d6846f8,0x7ffc3d684708,0x7ffc3d6847182⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1412 /prefetch:22⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1856 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7581736307538544660,3334155517654887808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
5KB
MD514d17302f0df2f176b4e8e501ff7bd92
SHA1ccf39e69a8e634aef204974d2da94c185880ec6a
SHA2562dc0afb4321ad2dcd1b31808a9010aba0e842ee1d22781f74c987b4eb2426e68
SHA5127226fd6dd5cf85ce24204e8bce9eabe830380f85e16e507b6a1a5d622c963adc0fe1d4b6291de469a7f41855e31dc403a21a4c4ef4f277dfcb89cafcff3e7268
-
Filesize
6KB
MD5bd2bfd8dbd4501bb7be43e2b05f2d406
SHA1892a0fc501415bbb6b0e39002fd049a89149db25
SHA256550af8e3ea4d9c088ff8285840aba668ee983ce18141def2e408ac383b7a237d
SHA512ae28f0dde6cb0df09347b6ba31190d1bcbda5c6e30c87e6aeb04f9b0b570a51e1f9bc81535d021819d4cbccf7b63dd5adf6f76df03d578ef7a3194dcd6a24a13
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD570c240117d815b91156b604e7c9056fb
SHA1dc4bd04256440811a33681386875da5518aa3044
SHA256b41363a28dc7b84c42eae9d862e1851fb7bb0b0c7d48ed5484c228c8e3e7c186
SHA512920da6e268872d5eef5bfe93aadd1591ca0dfa48e9cc3fd1e062675e1662af1131fafae108be7b6d595ffb0231bf965eabe670aa08e1bf15246e9e198cd8f659