Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 00:02
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3596 msedge.exe 3596 msedge.exe 4504 identity_helper.exe 4504 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 3304 3596 msedge.exe 84 PID 3596 wrote to memory of 3304 3596 msedge.exe 84 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 912 3596 msedge.exe 85 PID 3596 wrote to memory of 3236 3596 msedge.exe 86 PID 3596 wrote to memory of 3236 3596 msedge.exe 86 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87 PID 3596 wrote to memory of 748 3596 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://telegra.ph/Happy-New-Year-01-03-431⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb0ca46f8,0x7ffcb0ca4708,0x7ffcb0ca47182⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5100481321591832960,7595855529520251985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:3060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD5351b05125707afa01d4ce911412ab79e
SHA1834764c4ebc5fb1064072f459797cf66df14e210
SHA25605ac32d26f17fae57a7b7c2a50276d782c1751acd77a240a0f7ec4882648e62e
SHA5126b9bbea109f919f7f718fbd906849757ac77c7d3027dfdeb740956c19fee12d2070d5305d0c324369df86e942e0c686f7033121690dae706f5823dc188a36971
-
Filesize
548B
MD554c32e6a4ca9181dbd8516c0cc3d1969
SHA1f781545ad0bcf91f910801bb837748cd29966c97
SHA2564abd3fa8b5b0476d171bc946c88cf94ef488eae5b78037a3e441d9f8c4f24d36
SHA512e929f5bb9449f5f00a6b2a761f4adf38d556bd050fc07e4e9312a184ca73c5c96da60a1acfff21833bfc72265a48465307186b928fdc63c815b2a4987d5dea0d
-
Filesize
5KB
MD59c6b0ddd097aa0552003f275b08b3f05
SHA170c535ed67e1df57c48aa27211725c3a054b4439
SHA25652cc154d05a3583a0bc146c0a565ea214552d24b371425cc38727e582bfb0417
SHA512e0ebf113f2e0d9260443a568637feb6ecaed21593c6250258d07dd9179c78edb6d892fdecabc6cca12353150ddf7265490c157b40aa5559f16950e614ddf6a01
-
Filesize
6KB
MD56763d511fee2a59403b52f1ae371d4f6
SHA172eb0c67888165558758a7b1b76acd5b41c92e8f
SHA25600dc14d0bf37f34dd0bec73c376eb8f239bd208d23c5ec86d9806e47c1e175b5
SHA512632ce2cd2c10b741629ec41fb7a7c4b2d4c5a0e86c14e8775a3b1e5ce56325924eaf8f8c0d26a729e39517f3b1eec10590bfd9b99be2a881b55233a7d3e5b286
-
Filesize
6KB
MD5b75cf2d79f016e346b4dbe80a9a2a0ab
SHA1cc22ad1fc26551b8e6a0d5004a25005f6c33720f
SHA256418c7c4989843f1f21e881726716a4b1bf53da908f103a01ec43373cb974e865
SHA512e96005031ae5faa4d25bbf7884e13353480239860733e4a359f23eacffd7df2b93bae9a8818df775fd2fa8778c8255479dfbb5eac37a380965af0aee28562bdb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5301466961ab496040a2aacecf66cbb52
SHA13840432c47ddd58815d4b92f4300aa06b228cef8
SHA256ba0035494ea032cc2406d72ed786ec28ef85ecc48374c894dfca6069e0af4538
SHA512ce527c963f7deb70053e46355e80949442c6aa6d720a31f34e765ae6de7a7bee10fcad7b24ff2d60424be90b1100a47a245b5de41a771c87c20f52000c2192de
-
Filesize
10KB
MD5364c6beeee0520a9b64c07e56ef2244a
SHA16927a1db9a2d401a36309a4f36f43760959670ae
SHA2567d0c600ac37461bc8aece1f1fc6a938a3592c1271b627fc4afd8f08d15f64e59
SHA51270369ee6d4458b8b7c42eeac1fd44aca4c0b69a80b7faab75208e954474eb00fa83054c8557ecee90e997c337769f8517a32d269378f646719fff2ad6251b236