Analysis
-
max time kernel
116s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 23:56
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 4912 identity_helper.exe 4912 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1996 2096 msedge.exe 83 PID 2096 wrote to memory of 1996 2096 msedge.exe 83 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 412 2096 msedge.exe 84 PID 2096 wrote to memory of 2780 2096 msedge.exe 85 PID 2096 wrote to memory of 2780 2096 msedge.exe 85 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86 PID 2096 wrote to memory of 3576 2096 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u.to/i1YTIQ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72d046f8,0x7ffe72d04708,0x7ffe72d047182⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,6639914714832673940,11101355620390583421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\36e2e74b-a112-4181-a3d0-49e340f99df7.tmp
Filesize6KB
MD5c2e77d36c5b7ac30ef8d16d0b3d49799
SHA177362a3dfb3b70319e5e181ee80b0f8115aa5f67
SHA2569d558fbadace1f59f668223423f1d2b0e339d73b17555fa238eedaf7eddb66c5
SHA512b4c42803487a1a7452b1e666fe907c51dfef58bf99d938f39017a09e13bb65a0d1c44622729b4a2792171e0d65a47dd0c7ab2386c4826aab6fae19d0b2ea2773
-
Filesize
37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b44bef226cd02da84b707aa4e75d8bec
SHA1bf900280efb7ce26555c9ea24d78fe6d15207f01
SHA2564737d46c212c57a2af90dde628260a7fe5abf26e72a8f7011034caaa9d4107ab
SHA51290eb49bef3f81a4b172d271bfbedd5d9096f9135129c1a92d413a7f339f79193609bc5d1652b29c4258340372f5cdb461bc62f7e04857d7db7a7ee5ca3999f39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5e0f2d904688c5a0bd3175bedfe836c99
SHA10766bfb8519ffc5601c7b6c27412134b1a9ea594
SHA256bec321f0795343524d9b7cb749505411dd4a03902e5366fe777699c52f8f63ca
SHA51248df328346d96ec1460bee616ca88afc9ee57d560573095be12a2204596fe699008f5fccdffb18ecd763896fcb23248375e73265ce2d7faa4405d59ee8a9a6a9
-
Filesize
689B
MD546071952e9c4dd742eb94875e523ad33
SHA1df2e08bcf5ffd7db4d695f4665bb772e8c5137b4
SHA256457d57f75a1db81268cff07b67af3be08a78885719d8d6104d250e40fc175a72
SHA512585a4cafa3873ad6c49821e4b0ba2481e558ee0ea65f541e1a5d6beeb1b58a5f2aac9c3fabf8d2ea5a96e549f6a6b126bcf866a259bf6dd9ec962d8f2de4381c
-
Filesize
6KB
MD5116720444854359eed9f2add7e592bbd
SHA1fe8fb652f84e5342969478768f3afeb692ecdfbb
SHA256f15813b7418e8cc4fc0fc09ccd4229a8fbed1246a93f8037e1a439248b3409a2
SHA512e5aa0b872b8a9bc490b32a929556829312b369ad0c6d1d13d500cc01371a3096f40ea549a6722c7ce6e2f317435c8b9e881236d4b9de348a911693de3fb353e1
-
Filesize
5KB
MD57d9572ea8743464eec33fdce4e3d4ce1
SHA1af53a3edce95458f32fb554122e07e501461e7ae
SHA2565160046b32ab27e6dc3f896c96589526eae5788a1fa9503cc95c529608a2d89b
SHA512ef966bed482adc2c76a42d4009be00e617160a500fba51393a7c8a2707a9a8af36d57769fbe9f0ef88178a989bab901173b912e0cc779aac0b91daa9acef32d8
-
Filesize
6KB
MD512e4c2c4e5e7cae9f8c3e77613cc9e30
SHA129ef3346f006c49d0c0977b868947fd5f49957b1
SHA25662b8d12cdc76d4cce443387e12900aed9af9f03bc0a3157f4775b0df33a8c66d
SHA5123b4b603449414868ee4a017186126753d3ff00c750ca17dc13003c7db839a23bf247501b32bcc3bc0b0a2de6e4d33d29071b326eaa343b0826aa8ea1f2af96c1
-
Filesize
1KB
MD51c118e91950ae7bf9ff53be4cef7bb46
SHA199e6eebbc92d0e4e686a12223bae9d96c3ce11f3
SHA256490acc2c9bd9d5267ab449105040536e7407ba6ab156aa2b74c0a049c0d49c79
SHA51290ad3641f8b02970aa14a77bfddc5c8fa909e6751a94a964542d5d379cdac362462ee1ce32409566dd3a537a2fe65e0f176153a26427ace1cdd89d7c3edfc3ad
-
Filesize
1KB
MD579d0c1364c4b26b7bb8e8509c951815f
SHA13ad0975e71585ea2bc1d5cf98313ea6515535c2a
SHA25693ee8ecccceefe6b0558e864684dea89c45db5fbf071c86002bd860ab17bf69b
SHA512cb23b2ef32fa9d979dd5f0386a343277f26e85db644b485b7ca833e71fa60c66c9f065fc41be3d4e3bc82bf68d9e529688c4ad5d95a74f73cba2b4e767b46a52
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5ad2021b8eb6f7c6331c561f0f650bcd3
SHA1e3977c7ef887497ac71843dcb6e5182bb38d5fbb
SHA256ae8a9f0dd36faa41d5ea8eea1a087f8c846bc91dd187d57f4b4b6fda08d11606
SHA512304cd702e06c90b21ef64561dce7ef02408c04887dc625a71c0d717771ba3db15a325dea396bb5c5c6d6306421728194168b7453bb0c2f0b0b4401c3edac94b9
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84