Analysis
-
max time kernel
23s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 09:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20241007-en
Errors
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "5" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3176 msedge.exe 3176 msedge.exe 4684 msedge.exe 4684 msedge.exe 5400 identity_helper.exe 5400 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 5556 bootim.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5252 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 3912 3176 msedge.exe 83 PID 3176 wrote to memory of 3912 3176 msedge.exe 83 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3780 3176 msedge.exe 84 PID 3176 wrote to memory of 3500 3176 msedge.exe 85 PID 3176 wrote to memory of 3500 3176 msedge.exe 85 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86 PID 3176 wrote to memory of 4836 3176 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6d9d46f8,0x7ffb6d9d4708,0x7ffb6d9d47182⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,10025487192998177639,17819459307607543858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,10025487192998177639,17819459307607543858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,10025487192998177639,17819459307607543858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10025487192998177639,17819459307607543858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10025487192998177639,17819459307607543858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10025487192998177639,17819459307607543858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,10025487192998177639,17819459307607543858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,10025487192998177639,17819459307607543858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultf51a3fa0h8da4h486dhaa72h5ca0614651dc1⤵PID:2724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb6d9d46f8,0x7ffb6d9d4708,0x7ffb6d9d47182⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,11173861701899125755,9782360583029306477,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,11173861701899125755,9782360583029306477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5236
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39bd855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5252
-
C:\Windows\system32\bootim.exebootim.exe /startpage:11⤵
- Suspicious use of AdjustPrivilegeToken
PID:5556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
6KB
MD58a286f3b499fc1d93eba6806962aaeaa
SHA18d1c928b4a890f65febd7a1bb4085f82ef64192d
SHA256e141b4fcbb58f2984ec24872d6ab4801d64c835dc526de5ceb45fb9a86b18859
SHA512a8cc6122e31840db8c2a92f3c7ed42e38e186a4bd42d356e6f170021845b08f7a93c0ddaf8266184cbcc4dac35abae7031f2214149312b9d0024edd241b0515e
-
Filesize
5KB
MD5445e1a7af474b4e392fd10b40703c244
SHA168cca1b70ab21b8201606504b57a81f02ac00042
SHA2563137e997d88109dbffaae31963ffdfb61af5be3b5a2992da1524dd581a13e764
SHA512370b4a1e2629c05e746c209d2c9b957f2a710cc8a20026dc5f8b9185b69ff67cb1d282fe9a5b3bfa7e30eec0cb122b869e2020aa9fdceb32aa86549bfbf8f97c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bf4d5fe2501078b51e123f5b75f37a82
SHA17aac89f3aad202edbafd5e2f658fff85083d1156
SHA256e1758dcb6a8e4e6f8437b61d851c3e744d49b8c8265e31660416d6fe02465382
SHA5120c17dc3978e8ec5eb518eb1e6e9a3650c571409d79847d9586ad53ab2a15c7eb0d39349b14d95939e5e7009f590564e89211a6876b90d4202bea2433a365f93e
-
Filesize
10KB
MD51b2771c8d79b430c5e8c0f596e912e14
SHA1c749af5605e5bc83d58fa693766db1ebc9f3f998
SHA256ebf836bd3dcc1b3f5409b3760a22f0dbb0d6ec32db9cd9e028e18361ba4e5884
SHA512cfe808ed4e97de176278cb9d3d778acb318fca2464cec941d98ad8c1c1c77298ac95e04c7b5c573f5f1794f9d84520db6bb76da405a2c72f93610309c33705a9
-
Filesize
8KB
MD51c1892a358ad6d78b2166a5f6bf7b40d
SHA122c5a576151442a9449d936d3506d7d23efc8ed4
SHA25618899633c441e6eacc67f3ad99d737485984a10eb0400a1834b5918cbb5d7612
SHA512af2f6deaa901f0732796107b70a03bc156df9cd0106e460a212fbbba2fb0f112d08cd5aa5a2f721b73ec957cd98a372f993e020e50820e010903b47b75bccd68