Resubmissions
19-12-2024 21:14
241219-z3cnjszqcp 319-12-2024 21:13
241219-z22laazmcs 319-12-2024 21:13
241219-z2wp2azqbk 319-12-2024 21:12
241219-z2dt8azmaz 319-12-2024 21:11
241219-z14dgszphn 129-08-2024 11:14
240829-ncgc9sybpe 316-08-2024 20:51
240816-znlb5szdrr 316-08-2024 20:19
240816-y36e7aybqm 915-08-2024 16:42
240815-t758rssbrb 815-08-2024 16:35
240815-t3qbra1hnh 5Analysis
-
max time kernel
1800s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 21:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bing.com
Resource
win10v2004-20241007-en
General
-
Target
http://bing.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 3252 msedge.exe 3252 msedge.exe 1980 identity_helper.exe 1980 identity_helper.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4104 3252 msedge.exe 83 PID 3252 wrote to memory of 4104 3252 msedge.exe 83 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1612 3252 msedge.exe 84 PID 3252 wrote to memory of 1440 3252 msedge.exe 85 PID 3252 wrote to memory of 1440 3252 msedge.exe 85 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86 PID 3252 wrote to memory of 2300 3252 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://bing.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0ac646f8,0x7fff0ac64708,0x7fff0ac647182⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2350794404682231864,3075980112212812208,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\25638be1-3427-4ef2-9da2-6d21ce377d05.tmp
Filesize841B
MD53d0521a43409362a8bc2c247ba692019
SHA1f143952f338e83079e506194da429e5b270ac56d
SHA256bf116c37ab9a07c762ac00ce4c30c7f7e5baa32f7e7f777c6d7288896730365d
SHA51275e44a9b35f475469bd28b60c8f1afe6fb7c3ea2516f7c11e60c20a80d03dad081848886d7aee485cf8ad2a68c4f4b3ea13de5a5d29d889438b374ba582fa62d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD52bd013fa757c0b3dadef00a0f87ebc09
SHA1a961d88f8b697aa75088fb82a22a50daa3ebf785
SHA256bacc4c194591c352d82ff8e6992caf1ff40e5544b907e59326fd671301cfc23f
SHA5127fdde42796659dddf00fdcedf1cd7ec89879eb5691bc266c8d2dfedd74ae442b06f1711f032b776c1b2a995adaa45a02f073405d585d2ade45b031d369fa732f
-
Filesize
841B
MD5d6f997237dfe8ab7bbc79d56b1834cea
SHA19ffb8a327564b7f44712070214384c271e7c5008
SHA256ef912c7717cb21177e635684d1b146a50131f931166eee56fc65ac9c55c8fbc8
SHA51240155713ce40115703e4d2cd029b7a3f28c51a166801ffdef53ea8bca81518715107d1f6c95aa1ff24c07108cf5d6dfadd8c94db443290394163a8bbc5971828
-
Filesize
810B
MD51b69b841f8586b7fd2823df53c80139f
SHA1dec2d70144513a5b2ce2874b9866c6642b7997d4
SHA2561b581f03d4b7a31a7b3c7853d276f65c0321a625cf9b1f2643d21082018f54f4
SHA5121df643ff23985701771f7316758e5cdeb495eb3c6ed94497839fe75e121f032275d9affb2bc8d85a4963341d14000ccc684086cc107f38965dbf99c72b0d74d8
-
Filesize
843B
MD54573a1740e3543086158358db2efc022
SHA19819eb70556e135b70af058cc70751a741d1cee5
SHA25610ffd9a5a269fb9e61bb92dd7f9acfe4c3e9ddfb8ff9694e677a45352a034db3
SHA512b5506f501e5207873ff2aefd8646b67fc7f792fa1b7c7e09a2e646a64db044d38f6e29eb25ca04fc2a02074cf7b93b901fac2c6266b4e7fa3e15a6d550dd7125
-
Filesize
6KB
MD51c8a6091525f423703e4b93930da3c52
SHA17dfc7e91610be19f0db723155f48513f2f87c4a3
SHA2565bd664ee16ec9d5967f8f81138663ca6cf8f7eaa3aa3b232511a31fc59d08bad
SHA512d301032ac765ac6d075d560ddd718ef36c0b57e2446cad24ec642023d5b729975123513f136c6d482eb3b6489241b7c1c7e24d09b50e2ef5005596e0c128788f
-
Filesize
5KB
MD5b6f16195ad55857927422d4859304981
SHA1236221326cae91dbb3dde418492d4e40bffc5b56
SHA256056da88f45a38c3f4dd0840c19f890dfee0106e3e3fde9fda4c23816487bd23e
SHA512871da2eaa9d915cc83c5c400a649c3a3ade8fee2e036af390cb448ef7f7752a073ad1885fffdb548d4a438a104d7de8e7e81d684ace634eb99d26dc7586545a9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51158b02b69feb7cb2596d88c82e26a48
SHA1881b53c5d715177b8b89ea01dbea6feb75c8e10c
SHA256bbe6d34bdc81724062e785398e33b3f7d00b488fce0de8b969df6f30ea9fb0d5
SHA512ea30b6e9d6da1394e5b243a7dabcf9e68242dbbff022966f7492d6e69525372fab4f20f1eaae6faa3b7a5264892ae2a0b708afa085c460d4742cb426b6f508f9