Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 10:27
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 4572 msedge.exe 4572 msedge.exe 1032 identity_helper.exe 1032 identity_helper.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4052 4572 msedge.exe 82 PID 4572 wrote to memory of 4052 4572 msedge.exe 82 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 3704 4572 msedge.exe 83 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85 PID 4572 wrote to memory of 4424 4572 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://aka.ms/AAb9ysg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83b1346f8,0x7ff83b134708,0x7ff83b1347182⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8927907626275836436,1585821550174138594,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
543B
MD5f232f346f7216c5639f514120da9c3a3
SHA1cd65de650c07bad0e36ab1fdcee7d9186d059ec1
SHA256d0412db1a81b624df936d28cd9d46eeb5210fb5b06b2c94cf12fd4fc10938be6
SHA512ba413b6ac9956f4fd377f9061707f8d2a9645ad04b38147c24755c09b8d5b1264c246160a1f63db9dae40c391ac5d0c649069ce34098c38250904abd7a695bf7
-
Filesize
5KB
MD5496987c831fe1c0294070da5b20ec4b0
SHA128141f96069a3c5277db3281e6349c4ba7f9adbd
SHA2569cebf0911d45a82cc181df61e360545719744d6710d64057547e4c5a591b54a8
SHA512618a3f1394d30062935f25c201d7c944f50ab32d4f33eba00cbb31488d67d345cbc78efd1ffba4ff8ca8e609a2dd03374f80e6704042c5b4fbb740e6e4ff6ccd
-
Filesize
6KB
MD59b4df96fed309b7171c00a402814ae4f
SHA112f6fb09c30c4b78960af8c6a9314c10d618ea8d
SHA256630e83f7f19d50544d9c09771e1ee39db81a5f46e642470b24aa42d9a3ad205d
SHA5124731a11d42198ca22de460a21dc44457d056412dc0bf659690d80235b229930906e321420fccded6ed09207ac3c6e6acd58cde62712e4e26ddc5587e8aff0b35
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a994156b73a894f8f59464013dc1877c
SHA1019dbce33bc66971c576627e0e83be3992b79e7e
SHA256ca9d4215b685ac6e0471d5500b25fceca547a7a8ca839a24a1fc8b6fc7f12bde
SHA512b1e0b282ff4fb3c284ca39b1067e8525e9de3720f34c757dfeb2fa358e7e1bd29ecf3ac1797160f1899ac42fcda05e3a1f6a1ada379bee4b756ba85f966bcb11