Resubmissions
17-12-2024 02:08
241217-ck2hmaxrgk 1016-12-2024 01:58
241216-cdtt7sxqhs 816-12-2024 01:44
241216-b517xsxmes 316-12-2024 01:41
241216-b4dp8syqej 316-12-2024 01:28
241216-bvm8bawrfz 1016-12-2024 01:13
241216-blhw8swnas 515-12-2024 20:09
241215-yxkarsxkdn 7Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-12-2024 01:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://noescape.exe
Resource
win11-20241007-en
General
-
Target
http://noescape.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3564 msedge.exe 3564 msedge.exe 3144 msedge.exe 3144 msedge.exe 5060 identity_helper.exe 5060 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1164 3564 msedge.exe 77 PID 3564 wrote to memory of 1164 3564 msedge.exe 77 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 676 3564 msedge.exe 78 PID 3564 wrote to memory of 3788 3564 msedge.exe 79 PID 3564 wrote to memory of 3788 3564 msedge.exe 79 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80 PID 3564 wrote to memory of 4504 3564 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://noescape.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff977b3cb8,0x7fff977b3cc8,0x7fff977b3cd82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,454701053137411810,2955739117584181778,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1652 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
Filesize
5KB
MD5d36af05ba0b9425f9043763e500d3c99
SHA1aa58cf757f4a52ea2cbc1c037e13880a67cb340b
SHA256fc11398273221c63296462befb02401c1be70731e0308e01dfa710f98115c013
SHA51286967833698f7d1f06a8106f7d9200a8859426a719646fb816c420aea1fe7a5760e5bf2752e12c55e99288221a2dcbc48c0ad8f6eae87b17e879fdf421f0ef8d
-
Filesize
5KB
MD5fe42a92e8151b61bf4f604e0e120a1b0
SHA16c1f758b19e54dff47d0789f484f6567d360bffe
SHA25693ba54cc215a3aa24e3e742d0cbae521f7aa2e15ca69e632465daab962e95e82
SHA512305ee1c83396eb8728a841fb55630e776457741da0ba262e3a667b52ab01973a0d81d71a5d77f75bcb342eee59ea3c99f5366488ae42db59e31c081b85c8e11b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e59a89139e7974645bfa9443f2893b48
SHA1424ca6c4350ff2bfed35ecabb202e3668933f701
SHA2560b0696777f5cf39730bb3747b3cd76b7988f55b25c414ed28d7ba794caa36b91
SHA5123a6e0a3bbd5e400addbad46a06382f9d40afd61d3a761dbe4510902a204c4d797a47e45cf264b2657c91363210ac6a552f211e9cf0d131db79de96081e63958a