Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 20:39
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 380 msedge.exe 380 msedge.exe 4692 msedge.exe 4692 msedge.exe 4320 identity_helper.exe 4320 identity_helper.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 4252 4692 msedge.exe 82 PID 4692 wrote to memory of 4252 4692 msedge.exe 82 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 4880 4692 msedge.exe 83 PID 4692 wrote to memory of 380 4692 msedge.exe 84 PID 4692 wrote to memory of 380 4692 msedge.exe 84 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85 PID 4692 wrote to memory of 3976 4692 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://s.team/y24/dqrvhww?l=german1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcf1746f8,0x7ffdcf174708,0x7ffdcf1747182⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6953409147207661643,9282458728143387449,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5625bddbbf40423c1495ba1e842392d48
SHA1d5ba2071a5a89f6eb3d34e1b79d244fa09599c06
SHA256c60f3eca23adb3f78fcac3461717570e1da26539f13c761be6e62f8fdd5c3960
SHA512e6f517bbee72bed670d3da53538878714cca9b8e3f5ebcc72e165e75e83e0d5260411afe349a020dd55791078e353be5aeae9410331bde3a8b182fe91be0a6be
-
Filesize
274B
MD5ed67f39d3cd7990f61bfec80ea2903eb
SHA1351f55c1354aaf18bad99292f2bf803919e54270
SHA2569904fb2b8e0dd07bf02fadd2763a9dfcdc36a6de5d51773d8ff52b1156cb77b3
SHA5122d3093d3e2bc8825501b4c38ee597686221eb75fd4dc1ea5f99ae1823b2ab603f99ad89f5c37cfbcdda52b1303b030fce446b663439c28114528287284c1a7a1
-
Filesize
5KB
MD5c04afe4e6af82a3e8d33d4e9eed1ef30
SHA113b28aa979ca060fa18fdba3fee10771dc256098
SHA256353a1814acb707e5bf6e8ec521dc2936693dacf6bc63b276e18745ec9863393d
SHA5126af2e7ff29b2739874f7cdd384696a290e83f09fd31038c1e88b337a43c9781c2960acbd1e42da9f9871236f56af5efbc3ca175ebc0705a7444e6499266e40b3
-
Filesize
6KB
MD50784d96dbccc092a0c1b265944315c9f
SHA165c1717ecd1bf3129b1b31bbdda5d8a798009578
SHA256e022450dc11cb71ff45702cfe42f71eed0ba2f4eb6ca855722bfda1a12beba6e
SHA5121c142db4b8bb8be4770956114332aae083d7c1fea07fd17b0971c178b93a0b942fa37d5413aee5eeb643bff41b0b037fe87bec0685ba338f687d045195b963fe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5934299d3db68e43c0c198afddd44157a
SHA13401db40f0e887067ebfec2d80b1c19f4fa1aad6
SHA25667739cd2143e4660e721609cc41a6d2fe929c3bdec962b58544e568a568f4e28
SHA512fff67233a7080a5e4aaf148899617f726dc941edcac98de4bfb135ec92a74aa4e1845f65298b828c7d6552262b923dc2dd13a2302859eac8599191565e312719