Analysis
-
max time kernel
82s -
max time network
78s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 16:23
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3636 msedge.exe 3636 msedge.exe 4692 identity_helper.exe 4692 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3636 wrote to memory of 2344 3636 msedge.exe 83 PID 3636 wrote to memory of 2344 3636 msedge.exe 83 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 2076 3636 msedge.exe 84 PID 3636 wrote to memory of 3280 3636 msedge.exe 85 PID 3636 wrote to memory of 3280 3636 msedge.exe 85 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86 PID 3636 wrote to memory of 4976 3636 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://stcamconmymmnlty.com/typo/fyt/sik1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ea8346f8,0x7ff8ea834708,0x7ff8ea8347182⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11365060919616749350,12867876880212362773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:1440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4447e2f3-600f-4984-b2d0-02270c0aaa71.tmp
Filesize6KB
MD56e2c46426cc2e3632998de3a44d3e599
SHA1afd17d3e5c87dba96356325e7d9b3158c6144820
SHA256fca813253f026a516c3ae0ad90f1a95c92905726c2a75226dfc0bb2949ffcd03
SHA51245cd0155e113f35c0240245992f8c2d9c13bd59785bdfc6a4582f0eb93151d56f99f30db70b9e53eb9694fdb04dda5bf0da1eea11c9df00ee589283d466ef73a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD55577b97ea68f840b431ecf2e6f46ea60
SHA1caa2c534f032be4e4cf46a51d8cb25b0c17a717e
SHA2567bba55b508239d41fa77a40a8432b7f5d503b88db4f566103acf57e7962cf413
SHA5123c1031645bb9682f1eaab65b3cf43e8bba01b845d3cf8ae5d14fe5add3480eb5aa9f5b539a7fa0d38eb5765b8d639265929cb5626a614d75cad91bcd77223270
-
Filesize
1KB
MD58d7116b9f6dd226585fc2a37a2507a83
SHA11bf323251a620675c2608f5957cdb1dcfa8a9830
SHA256f5adf0dd7f1190f73d74d3e566075982056ed488d0b4a95527d2bce0b6a05432
SHA5129d880e81e5b7feff7631c88178df7b48e9e201d71a411340ab084b0416f63594846bc5f5799594488e9c77b9c14113b2f7dc992b0278a0bc83645c5cb7e6baa3
-
Filesize
5KB
MD55ab564c1c388726592c9c389bb1636b9
SHA18841a62bd1b9ab13ca659e2eb42d5bc2ee098c0b
SHA2566caf0b4a2a1936e4c0e008178afae4502737e19e957a7e9139941720cc0c0797
SHA5128d89f39aca58ee13edbe9b2565101c4c30cc800c2ed9eb7a5659859edb59cda3957b302f800dfb7ffbfe9b14a01caccb90c73fedf5099f56eef4fb61fd639c51
-
Filesize
6KB
MD56285ebd3930405da55009156470fbc3d
SHA128c0050a0a8ce0347b99ac6b3d4cf77b14034c81
SHA256420a747b18805e1a0c70c3f21b35db8218214e8c0649e395d786130e08dd9e02
SHA5129c4ada5d4013dea8531c7705aad0e3289fc33d1d68af3dc12a11ef6a003df2dcab030ef8eec46a1f7d6d0c66065d3d76b2a975f5865a7bf97c6dd12213a821b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD538f219be7c5e3cfd0370b70772c033b3
SHA1c47a3b6d94b8bcc3435d9cdb9e20e7f984f501c9
SHA2566276ed4a0778d82a3e2bda6b8537b0011196751793694335e1e477b5bb961d09
SHA5129b88670d7dd8b9cef4163a9f92bd3d62777306412ffd140be3260143f02e0cdc3ea09f147bfdd8c6f23d35fa270600cfe856733110795c776b387a6c54db4d5c