Resubmissions
17-12-2024 15:44
241217-s6sevasmbt 10Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 15:44
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 4120 msedge.exe 4120 msedge.exe 4036 identity_helper.exe 4036 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3824 4120 msedge.exe 84 PID 4120 wrote to memory of 3824 4120 msedge.exe 84 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 1672 4120 msedge.exe 85 PID 4120 wrote to memory of 2184 4120 msedge.exe 86 PID 4120 wrote to memory of 2184 4120 msedge.exe 86 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87 PID 4120 wrote to memory of 4180 4120 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u.to/LisSIQ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99bb046f8,0x7ff99bb04708,0x7ff99bb047182⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10770081931577875775,11102762442204453827,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5bfa6c696a89eb4893dfba994cc67f839
SHA10e86bf2acc8527a6e1ed6243da91a0e6f3d8f5b3
SHA2564281ce81c25df821692db0d99660d39dba0ecd74fbae736353983918cefb925e
SHA51246e50bef0e0c68098561f7ec8fa0c27ff9450d1e53a39bbd5de733ec28fd31652aeff7b204b3a47532c272cb8b05fe7d7e7885651c4768e19674f398309a3c28
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD53abdad9179c5b0248dceb4df7d8b7871
SHA1fa67bc942189f3e4d5e8b3efb3020bb9fcaba71e
SHA256023bff09d21a2f1dead0c09d2b620f643c73d53a6cb3b2b94921b027cdf62452
SHA512953a2e69b134c996580753d615607f26c25f032baac4c01778e2a39a5f61961c57180d6c7882776fa8965601e9eb0becea45099a5793b52014c83875fc9ca8c9
-
Filesize
783B
MD57e3d0808b16be0254c6a0c1e71371257
SHA10d64ec0b3f5cf90ea813c07c83e30e49d1849c33
SHA2562bd865f8877d621898d902b0883cbc62d9d62aa1dbf5f11761fe2cda50886311
SHA512302596372e1e2adc5b6af4bc86a4e5f9fb7384549db3938aeeb537c6716e9da505827cf9727a3f1288f96ac7e8d65d0f1b7a0d8767f02e245c5f5c62e79dbdef
-
Filesize
6KB
MD535f64e4688526ac387be86251dc0f061
SHA1de2d27d483b2989f613330257fff4cad760fa5fe
SHA2562f9ff81cc632b274836cba9f5881c6e91d566a0e05e49880248a65623a1aa485
SHA51263f3b3e0abc6825f42fc3fbcd82de54295b56c8cdbec992da631ebb079217083356907a6d4d2efd8831420c889587d9c92030530ef2ffe5548b698d5ec350637
-
Filesize
5KB
MD5b4b4620a6cca738e321cf351ddca50d6
SHA1b18d1fbbf4a5b9ff769fab9b2297465953c52d7b
SHA2563b610516f7097455a7489140c3e821e0a3e10d9693e623192f09f902b991f89b
SHA512ea2cb0bf6a53ea481a8b0aff1b9a708dfe9729fe5ccadc52852e599352b4ccb01698036edca581e219f1aa54270a040347dcd1aa875747425b5837211316e4e4
-
Filesize
6KB
MD52264c2b1d40cbf7640664b303d4ae185
SHA1c4750e4435d8c3b779914298e901380ad0babb78
SHA256dfdbb8be4f961a63bfd20ccfe2872f76d9b3f7994ae1c1b5a86486fdae49bc36
SHA512acc77eda17f4cf05c42d5752768508362dcf8cf74da68feca03282bab973a076538d68578870aa6a8e234df2f54472981ed798216941781aefff5f7c8a100f1f
-
Filesize
874B
MD57b0c1a68700ea23e41c9b2de2a5c7f77
SHA1b6b978dd11603b72660e4086b607e6ca920eb676
SHA256497ed06aa9c493bd9f69fbb6847496ca93d1504380f5c9657b2811f130bce1b8
SHA51229b5f9876744725b13a164e3da8031e2afac24afd5e3ed609762cdcf2090ed409a0c471f9601dea812f3a2441fc70828abe29c83a5c52c2a361c1865b154b734
-
Filesize
707B
MD542f1f25f121142685a3740aa8749208f
SHA1925a2e4b939d26761515ea03d77d08da4b9d9bde
SHA256125468f1a0dd19972a58ce79b7992a15dbe3902c1c188ac7c752b5833f03a70d
SHA512ef3a0d3fcbba645e518fa64463bd7c483c797e0163f9d29eeb29752f7868e8ba85aac4a22c5488ecdf81e6cbaeb8ba3ce3bac9e036548f9f0f9b5c1d5a04481d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD58748d17570031b61e701f4f1c4d19cc0
SHA19aef8161735844f8867ea9d5958d7382a881f4ba
SHA256342a8c08de7db92d93aecea4423fd7e005c7fe518f23fdc41e6917f27417b548
SHA5129fa45c0975c39499f85c751ef4eb9ab60e5c09fc38cdd492092d9b1516402a496c666fc9ad0058b41d897100e4e9ecf2b7df95b030d2142f57539a0e9088274b