Analysis
-
max time kernel
57s -
max time network
58s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-12-2024 15:44
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3996 msedge.exe 3996 msedge.exe 3528 identity_helper.exe 3528 identity_helper.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3996 wrote to memory of 2872 3996 msedge.exe 79 PID 3996 wrote to memory of 2872 3996 msedge.exe 79 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 1140 3996 msedge.exe 80 PID 3996 wrote to memory of 3576 3996 msedge.exe 81 PID 3996 wrote to memory of 3576 3996 msedge.exe 81 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82 PID 3996 wrote to memory of 4016 3996 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u.to/HEkVIQ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffea0433cb8,0x7ffea0433cc8,0x7ffea0433cd82⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2380 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,888492927401104423,1958023160259530236,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fdee96b970080ef7f5bfa5964075575e
SHA12c821998dc2674d291bfa83a4df46814f0c29ab4
SHA256a241023f360b300e56b2b0e1205b651e1244b222e1f55245ca2d06d3162a62f0
SHA51220875c3002323f5a9b1b71917d6bd4e4c718c9ca325c90335bd475ddcb25eac94cb3f29795fa6476d6d6e757622b8b0577f008eec2c739c2eec71d2e8b372cff
-
Filesize
152B
MD546e6ad711a84b5dc7b30b75297d64875
SHA18ca343bfab1e2c04e67b9b16b8e06ba463b4f485
SHA25677b51492a40a511e57e7a7ecf76715a2fd46533c0f0d0d5a758f0224e201c77f
SHA5128472710b638b0aeee4678f41ed2dff72b39b929b2802716c0c9f96db24c63096b94c9969575e4698f16e412f82668b5c9b5cb747e8a2219429dbb476a31d297e
-
Filesize
528B
MD571f83a2791340b4d3d26f645c39f055c
SHA1ab3bb6cbd94921c80b8172265341844235eed40e
SHA256d66f363debf47b2b9e50e6ce7655e1c33e82588f0de4cd629054465f7bf72c1e
SHA5124323fac7fc79a241ca4b419c135530e7cdd443b6a87c3eb234ee5e071ef5746b0548afbe2c1496bdbd99e746f77cdfd9df48359496fa0f3bb7a4d18f4e12197e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD557d35fa3e7a4be70d75760d47c6140c3
SHA1fe5e588b5e2507621ab01b3a5d6518f8863848ad
SHA256b894877228669e176e61fed92cbf82119422cd2c8ca1ad9409d091944ed8dbd8
SHA512eef5e7fde69d413c7cc94d53aaa128ccaf6589b192297429f61659f7f2c8f4b6b1c308a4957cc23c230f493a30e3f2d728a2a0492824b861b6c24cc81cdd3abe
-
Filesize
5KB
MD5b5c96688e7450b61413eada2fa8e7e13
SHA19d1cf09f21f38e6e75b65c4c388e3d9a3d047172
SHA25687b8c9b7f4996addba623ad0670994c6c872629458d916fd530d023835bc84b1
SHA512cf0e4a3124b54d0f31b50b521d1705a9d2c82e7abcd730772949b558fc32409776e072a93331031b496d58bd50ffd8494d0e6fa476a0114c625c2f96a00dfcb2
-
Filesize
6KB
MD5b2f3dd5d6f17190c186630707eea7725
SHA1d8fb7fc4c0deb5638b379d8bfcced2881fd44125
SHA25621a07dca5d5eb56ca0feebbfd45c6afde985c451a22485933c0e3080c81ce622
SHA5129e6efddb05a1588b4abebc7fb0aa860e79380b95cfb3fc4e4ec7e2ae4828766d322289a7f2964b11c2083caa17139feac4ad9be6b8ff61fd7816696b87bf2c19
-
Filesize
1KB
MD5e3ca1286779dc66b87c4538b5a6c8ea6
SHA17b7300c7d43c8d4924ed1a760f7aba2fe2df658f
SHA25689cc77cf80cbded90f8a89fe8fb10efcfcd735b4383371b8394e6177b2e23360
SHA512175e41f4fb7e82fc579cc18bb7f4cbde142addf6bdbd3495a6e554a7ce732e58295e289e6b5719807a6d2e71651804d4276dfe587f764f20bb1a3bef5d506c3a
-
Filesize
1KB
MD550d3396512df277f3778271c2f762b92
SHA150d987c3576bd3cb7980bac99dcf84eae86267e5
SHA25675404ce64422a80530f314bb7256216a70695f0ac74b2ffab9f92fc43cf4b872
SHA51297d2472f3d149684fda3ae1e1626b3fdd408327e83a0f541ab409a15cb696a2c4eec3e3f2387effcecf8c0dff4e17efa6b011454b0c876191ec191ff2ea25caf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53822fc2df29a738444360b3586221963
SHA1debcc46783dd269210bd81f516ad64d66091fbfd
SHA256c1a5c42a28d74cc42242cb3d4a51ae915a969fa1ab8ae45fce90c5f3ee01337a
SHA51240f7dc359d4eec242f5ff1285fd5997de45aebdc02bbd0d2051a8359ec9f4f62369da8ecd74d426b21277762db26ad5d6f8da0421c7a3071079a3c766616eb7b