Resubmissions
12-01-2025 23:13
250112-27jc1atpev 611-01-2025 22:16
250111-162mhsskgz 311-01-2025 21:58
250111-1vf7fatncr 411-01-2025 04:26
250111-e2nn7swpej 311-01-2025 04:06
250111-ephmessqfv 310-01-2025 23:59
250110-31yd1swphj 306-01-2025 23:58
250106-31ksxstpdx 806-01-2025 23:49
250106-3vfl1swjfq 706-01-2025 18:59
250106-xm2avswpeq 705-01-2025 18:43
250105-xcx6fsvkhk 1Analysis
-
max time kernel
1008s -
max time network
1000s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-01-2025 22:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://noescape.exe
Resource
win11-20241007-en
General
-
Target
http://noescape.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 416 msedge.exe 416 msedge.exe 3464 msedge.exe 3464 msedge.exe 3956 identity_helper.exe 3956 identity_helper.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe 416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 416 wrote to memory of 3012 416 msedge.exe 77 PID 416 wrote to memory of 3012 416 msedge.exe 77 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 3720 416 msedge.exe 78 PID 416 wrote to memory of 1580 416 msedge.exe 79 PID 416 wrote to memory of 1580 416 msedge.exe 79 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80 PID 416 wrote to memory of 4620 416 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://noescape.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9289e3cb8,0x7ff9289e3cc8,0x7ff9289e3cd82⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2528 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,2274561980012804523,3667804272585686323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5aad1d98ca9748cc4c31aa3b5abfe0fed
SHA132e8d4d9447b13bc00ec3eb15a88c55c29489495
SHA2562a07cac05ffcf140a9ad32e58ef51b32ecccf1e3ab5ef4e656770df813a8944e
SHA512150ebf7e37d20f88b21ab7ea0793afe1d40b00611ed36f0cf1ac1371b656d26f11b08a84dbb958891c79776fae04c9c616e45e2e211d292988a5709857a3bf72
-
Filesize
152B
MD5cb557349d7af9d6754aed39b4ace5bee
SHA104de2ac30defbb36508a41872ddb475effe2d793
SHA256cfc24ed7d1c2e2c6585f53db7b39aa2447bf9212487b0a3c8c2a7d8e7e5572ee
SHA512f0cf51f42d975d720d613d09f201435bf98c6283ae5bc033207f4ada93b15e49743a235a1cfb1b761bde268e2f7f8561aa57619b99bff67a36820bc1a4d0ec4a
-
Filesize
5KB
MD5d434da9ddbbe7f26c08c203ecdbddfdc
SHA13022fe538653c63f273c2e5605aebc384c7ca709
SHA256d2810eda407b1407de99142819599d0e7dfde453c2ec265b90a5cf62ccb75d94
SHA512e6533069a80101b7247ce929934c0d4db0125ad176c88af26e40a85ec1c9627ffb00976fe8176b4943bd58d485e4d6e2699af472436a8f093fa92067856cd262
-
Filesize
5KB
MD5b7b98985699766826b6d23f40f6b49a4
SHA189020aa1c9dc079c8c17c006ec556ed7a92ba824
SHA2568b9a6dcd80b6550d4224835f2320dd8e78598e2eaa785503adb6c88db95a6c6c
SHA512146a931c43e7f16a6781f80556b959499004b7c8d48d1ebc2b8a6a5e583ab9f4cebbea03f4ea0300f8233a6ba733f0e9829d89f7f670d4a40019eccd79c3c04f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD598449a61b6f53ae26b74df3e909adb52
SHA1b3e657447c3e08d36e27d3d553f9d18839c37126
SHA256d97c2dc2e606108ab80d149659a85f907ba344ab19aed0e0d0f59211a8fca0c9
SHA5120c9b6a271acd395ffbad28d880d38f06fb1520f6d4f45840fd031dedb787c57397834a01e88aed40da6d69e17d2d6631d8ab5d5556079ab1f33adaf25e1092a2