Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 14:07
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 2396 msedge.exe 2396 msedge.exe 4836 identity_helper.exe 4836 identity_helper.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4504 2396 msedge.exe 83 PID 2396 wrote to memory of 4504 2396 msedge.exe 83 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 888 2396 msedge.exe 84 PID 2396 wrote to memory of 4916 2396 msedge.exe 85 PID 2396 wrote to memory of 4916 2396 msedge.exe 85 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86 PID 2396 wrote to memory of 2720 2396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://steamcomunmity.com/gift/activation/id=4895010361⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82b646f8,0x7ffa82b64708,0x7ffa82b647182⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,14197490359652476844,6136202986263129905,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD55c363e5416e5578ced80b6de4c25c860
SHA131c7067818fa65bfe8b85f3bdec08f9357efc834
SHA2569d0f01a9af69eef4d77da453d1110cc404070b1d117b967b2540d237ecffa332
SHA5123a27451a36952e3dd486e961a85c7755b58ba556e280708cc38cd9a7b090d8a8f68a9a5e8e2f0730866554099e0adf846eb299f933876ab269efccdca9707277
-
Filesize
418B
MD5c32a44cf7f16757b7554d51fa88054af
SHA1dd40f6979117aed1885ff64e9b48e2efcc18b96f
SHA256cc0e7cc4e8b3cc198543e262f430635c41107701cbdca29e7a8c3b4ed53d3fab
SHA51261bf70f5b470bed4e32fd6d3d51232ace4ba934bc8af6ed2560d508c177fac6e0b8ac7bb8a0fbae02e2b7246107b6b971e20d69a6d107c3ab76f6dcc5f6eb87b
-
Filesize
5KB
MD530448dd8a9f6e2fd4598cf5b1085698c
SHA16dd878baa0f6e9a68d291112197fd9aaf97a7251
SHA25627f2111790937f2384b83730a538dbf62c16b098291c46b35803501336be0e23
SHA512d3be647e51af7076c30334a8bc3fd886d6eb47f18feaf21fe75d1dd7e09021105845fffe3b5c77e78145c625715e917368f96be2ecb21bb76a36d20c00f949e3
-
Filesize
6KB
MD5190524c04dd281ca82aea469167ee419
SHA1af08375b577f3c31e1ceae6d86fd8c047a23e14a
SHA2567646462022bbc9ab2b8ae440aaeb5ab51586259616f1dbf04b6ad9bd70063908
SHA512edfe83f1496e1be0bd11b523b5965893b6367c4b677fc155e59b86bd0906c57198d54840bf277190edeae46007f2edab6e85a90df4ad72a741e274d3363a2f36
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d4bc8a3c7192ff454b4bf1928d9c8e13
SHA12740406c0d5caf2078f80d28a72b64f765c0439b
SHA25664348cd6fd73743a5187f2a7ae3129a2c4cf132122702dab63bdbfc201a5406d
SHA512d8335c9efece37133523e71a0516cd35d140cf4e1aa0ae659b964fa11f797611b6743a20fc3aa3a776dc39a119e880efbc01397b88fc8894e0113eb10f707df4