Analysis
-
max time kernel
25s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 23:39
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 1600 msedge.exe 1600 msedge.exe 3940 identity_helper.exe 3940 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1188 1600 msedge.exe 83 PID 1600 wrote to memory of 1188 1600 msedge.exe 83 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 348 1600 msedge.exe 84 PID 1600 wrote to memory of 1380 1600 msedge.exe 85 PID 1600 wrote to memory of 1380 1600 msedge.exe 85 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86 PID 1600 wrote to memory of 1028 1600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://is.gd/SfpIas1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61d946f8,0x7fff61d94708,0x7fff61d947182⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4124 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,411709124450167319,1540921849721502618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:1240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5ec7baba99f23ab38c3406a6606f6e958
SHA1f020333248db9d04c697ac2f757f178343fbfcdd
SHA256ad31a24eea3c156df4d8c092b7b2dcea904a84f54c198eae4875f0444d81c847
SHA512c5c920a19e95aa80f3f5f1cf8ada1fe465de2cca558a40d3e378e5f503a789a8c4fa0796abeae16ff713c50770530069de60ec378bb2439a42c58f6af3454e88
-
Filesize
5KB
MD51a95cf4f198fd4694981a7c92a6155f0
SHA130a572cc8765a40bed81a150936ef2cb6c031ed2
SHA256b214e126de3191056ecc683b8c6bd31c4fc8e9fa3fc3bd0786062b85cac33128
SHA51295ee9d165203eb13488bee9d23c75d41487993ef9b747fbad1d37898588b36fa2669c58493e5bbb30f48d07c8879b91b284a71e14b216f2b38ea52615d72b3d0
-
Filesize
6KB
MD56744c87dbd2be83c29bdea024dd5e62a
SHA12a905dc63c930d9084b1b29abd389ea55b8ab0cd
SHA25626ab7217129c904848415722ddce77b37ed6185a1caf09652a11539e8adda1d7
SHA5129ccd32fdc092c37a2b5babedd87f49068669d0ee30d733e1f4269ceef1d8c72248beac6c1385c633b1f05fd06dbb47b89d44d3845a03e7a9dd87efbb832bc771
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58dc606f90fae04a29cb8031a8dff1f44
SHA16f5dc969a98ca37e7cab0c11d34524a4b3616578
SHA25675562249c47c27a710fca7436561079189e1b24062b82c567095b9bec9a20fd5
SHA512be0b78da67290bea490b244487cf8d563ce29499d5b25fded3f083920892f776119a96e35bacb65b4a444cc184f3d2f7ec9c6d30f21a2c62eef82b33bda2c518