Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 14:17
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3680 msedge.exe 3680 msedge.exe 2128 identity_helper.exe 2128 identity_helper.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4944 3680 msedge.exe 82 PID 3680 wrote to memory of 4944 3680 msedge.exe 82 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 4868 3680 msedge.exe 83 PID 3680 wrote to memory of 3396 3680 msedge.exe 84 PID 3680 wrote to memory of 3396 3680 msedge.exe 84 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85 PID 3680 wrote to memory of 2536 3680 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://steamcomunmity.com/gift/activation/id=4895010361⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcf1746f8,0x7ffdcf174708,0x7ffdcf1747182⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14191706464153456737,3583190639120749674,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5671b3ea6424612669fdc7f79bba01a73
SHA1d68078ec1a1fe4cabb53882a5baf41ee7fada137
SHA25650a0bc86987ef19a4d353bf64541c6ab3ed710fa125dc3a40227ffa1a4d99420
SHA512eac9ffe780f44af29b460b0a6794f6fd48c91ccb0d1aaa63ca8bb513388bc9891bccb88c133cbd64025ef4cebf65d77c14b580e30bd5102e8b133689395e748c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD51567a20cbf35f65d0998a0efe46e4b85
SHA13a01d45323e9745d353561b54d3a0544284c5e47
SHA2565c9774a73489ff53c74c876c337448a86f491acc37f6c5f6c3829c044d47642b
SHA512dda511c0e8f07c8ea68e22b410d5770f323267751e518ad4f8996bb67d6d3ebcbc06d3c08f75210fb8cd6e9e9ac2366d6e54231f9c332f8958e7e95d5da5278c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD54aede036d8b48425d68d8ae063866e6e
SHA12a9644a5bdbb7169cccb8b9250eb2d1d09cb27e9
SHA256cd8170c0f4313f60598a7908765574f42ffa39d1499d943d3fe7c17f948bccef
SHA51281f2609c003537d9aa981f73f3ffd0d4beb1b4d2022650d3ac5c58229db7cc3001e83c5109a240e8631896a0fc529e74121a16b6802685be3ac1ffc64a90f874
-
Filesize
689B
MD5b4139878e722d16e792137f325d19c87
SHA1366162d7373e8be47781a8a45f221890a38bb678
SHA256227b96dfee0589c5be5284713c9e3feaede8a5af5df0b65245a22c27a444297b
SHA512bc8bba4e03a4256b14b37987af48a5b34b97b03867fd26827fc917229519931fd71d15ed94ab2b5f73736aa4c5826109d4b4ae19591e162ff7195fd59a6bf3a8
-
Filesize
6KB
MD5a333ca6dc303b94a467ea7db29535038
SHA1dc05580219bcaab205fc24e39b6a8700e37b2473
SHA256bf4cd6dfe70e3a1160652f858ec6476b330bc9e305024a7f088b58ad6194f027
SHA512f4e0c7153d0af51c047280aff382ff66dae19c4c9a92aee3754d3e6c9ba697d7fb9cd77a9ab2fb3a7227b37eaed6059f01f41ba49d63036fa89e3a99cd629eaf
-
Filesize
5KB
MD54d33d2bccd09f7204b0716ea64d862e4
SHA10ca409c497eff34ff5ed94e0f982c6c6c5358b94
SHA2565c381abd40886ccd8a899dbd3241b094fab62db08188277807ac5b6b14965431
SHA512cedf7ed8891bedda48685a0c43096e2101676cff6f54295addffe7563111f8701646f537fead020304356941ad381a772a0c463881a54a1d46e3e81fb7aee898
-
Filesize
6KB
MD5a7534d76de9763091f2359c5bdadb63e
SHA140635d6b53fa5a57109fa949b86fc11a50b4f7ef
SHA25607b60b9ba67dc1112286dc1fffa92809b599d59d3243ca00c20f3f012f2f9284
SHA5123b88c0bbece7a7f6aee26186f41ca455e76b0b1070987cbf1341066c05f1ace7a79f7848d13a37f89779672445664ab593ba3a1109c9b320ff00f26ef8250add
-
Filesize
1KB
MD5d689b187ead1eaaf7aad187ef9277a57
SHA1ff5a4c8b4b0c7a7694482acb8b257916eea10c8f
SHA256a5e17a4e8000cf01c8987decb3ead40e9a5ef75272e2a4ce0c4eb39863b57362
SHA5122d6ce09135d73d6acce186a0b425fe260aed2bce743e74bda949ef11ca47ff05b41d837434deeb4a40dd93eda7562d9a07d13c82905cd9e1270b950238b46c69
-
Filesize
876B
MD5c07dc9573862ca79360af466918ab462
SHA1ec14bf3bb8dfba52ee03646c02a76ba3abbafbd8
SHA25607dca3b57d609adf716f7db378f7da56ea4009158ec667ab322583ab556e4b00
SHA5129509a97dc392fe7637c7aa93cf34577273579e9d5783d2ee4045dd0e1b6e066053b14c4e872f6baec5bb6e5064ffc831d5cd4ac00e1b5f4764da1eaec293536a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fcb1e997d34fe9b6c16a041dd814d82b
SHA15f0dbcf7f590563329f79dad183e68af237c07c1
SHA256943f1bcdbcdaeb861f2d0617dd3336db319011d24eb411263ccbcbfe9d063fc2
SHA512b2004682301330c13c17ce4caa1e82edbfe52b1d2bb9560428d0a7771d3530c02666868f456be8cb9d81a9392ef4cb64706999452f10f399406c86e5893f8a7b
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84