Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 16:47
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 2272 msedge.exe 2272 msedge.exe 1216 identity_helper.exe 1216 identity_helper.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 800 2272 msedge.exe 83 PID 2272 wrote to memory of 800 2272 msedge.exe 83 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 4888 2272 msedge.exe 84 PID 2272 wrote to memory of 2112 2272 msedge.exe 85 PID 2272 wrote to memory of 2112 2272 msedge.exe 85 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86 PID 2272 wrote to memory of 2916 2272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://ykg8ek.s3.amazonaws.com/index.html?AWSAccessKeyId=AKIAWPPO57XS4BTHJAEO&Signature=7Cwmlt57YZAO4n8h2F2nDELAP2w%3D&Expires=17351260491⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc53746f8,0x7ffbc5374708,0x7ffbc53747182⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,9177765552715319687,9926351609747881981,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5bfd68217207a9d962a94e54e76ce80e2
SHA1d4b67e0c1c5ac665091422d2189b324ee96393fe
SHA2568169534cce09de164318057683dc24f9142bdb00c64daf5923ad26350b9fceca
SHA512dcda01af3c3d32b84ab892492d71c2f9fe8183801b68f55f112fff43b3c1301eaed39801f873fcc6530eec96f9cb87eb53ddf39921514421203533b0d9e0a159
-
Filesize
346B
MD57cc97916ab0be7fef87e3052fa9092f1
SHA1cbdc9fd70b8f2fa886eeb9a63cec6b65d23b6b9e
SHA256677a1af7894bddd42d9f690533875a79ece4a7e5656ddefa6367821915217258
SHA51215fc297d4feedcd6654df44c3c41cae7f88a2e202f479ee26da74318b5d4dcca24ff180bd15b28f0e23e594e3af352c609df7910463bfc9e86b71641a89b5270
-
Filesize
437B
MD5f8082035a4ca43e313788c4e2ab53968
SHA18b55a98e8008c918a4cecc73cb10b0c0fbe42947
SHA2562e84c85b6da05490e116957d308cdf058b0b165a1cdec9b15e1f543f58334971
SHA512b0f21cf662adda045c9f9478a19de23865ac418610f54c6a7e22ec0559c9fcd5cabaebc4f7315ef09741aa530f48c553283eb8a38d8f39e8963ed58d31fe6fb5
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5e24424b87fad011f3c08ac35a1853d76
SHA1f51a3151a53230353296190f7ea02a757667ae99
SHA256f97b30c211cf00912e9f5ac12f42e8f7261f4ce7a94acf5d844059a48a685d7d
SHA512a1b49e2f6ceb08559b85aee43c4ad0d2b676e1fe7c0673c95db8fd403ea8e05486db887610569b757ba23c1bb9583454044be8d0f6bcff9c59a3496ec8724507
-
Filesize
5KB
MD5c7929db51b178aef6b6edb03a5335372
SHA1dd0fa96caa3318820e5b036fcfd3772d6abefbf6
SHA256c334353cdb210d3b0e0aa4601a347a9e4fb9e05710dbbea4fc9257eee7b0869c
SHA512980095c496e0540c5887ec9ad1c0419d1441084a9aeb84df6144c4cc94aae2b1642096de3174a1f87c2eeeccfb32396a3a5f288e00f8062bb5ff738f40632a15
-
Filesize
6KB
MD565cb77975708d254332389d289ea0c8a
SHA1c744910e8d004cf876d0c0353710d7ba1522cdf6
SHA25673b759a4bcf79ab47af7d0a6e5a24a1d50547964f38e8fbefb88e2266920f840
SHA512492ac86ac6087cf63c6d1bade8b74abb0324818427d71719928a99f674634f1064399d1966cca8c95dd9f5f0167ce2a266fefb50a9721d68da81d3e22184b2a4
-
Filesize
371B
MD5a55b4bf5d0a6bd3b9ad6d100b92adb12
SHA10cd0c19e188e14e157aea1b4ff54e65eef533dcf
SHA256ed2c700f42761e1c1566586894b58210b6bf6e5fab7ee2463740b608143c944d
SHA5120c29cb8c1b12ad1535028478e8be56fa474516c6602a21b89eeff835fae83f6e67f33ec7bdeb4cfc337a04a11415e68edf1d953328f98c67f626b13c922ced35
-
Filesize
203B
MD54b3b5a6c559b348b667cf3f9614e8d3d
SHA10625ebfa53506335831e3b2f0e663cdab812c95b
SHA25675deeea12d9f34dee341a9d866ba5e957b9e29d6c8ad6269b06e5764b6be7fd0
SHA5121a38c45fdd4b8567c559720ab71f2d8a3f39974e9e9400becd6c7ab51a3e9199f64d23a3aae44dead4c05fbeaa11adf4765e113e5edbae816d87b343816b04dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5455c59118d295c5f4f2fd9a6ec82acea
SHA1813bace4a7cc78d431167e40793de0247e535a3b
SHA2569ac0d7df43e9a157dac284c4c42551938c00cc4ef822ccff221e79a6f95707c2
SHA5126eddb22d2aadc1c148eb6470a6ee0f5ddf3a6d4144e6b69caf05246b700f9db5f8b29c9a0616eafabcc657fdeabdf62d5d8a652328dbe8d499fc1a09850826bf