Resubmissions
17/01/2025, 09:49
250117-ltejws1qdv 317/01/2025, 09:48
250117-ls436a1qct 417/01/2025, 06:31
250117-hakp1svnfz 10Analysis
-
max time kernel
294s -
max time network
290s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/01/2025, 09:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
http://google.com
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
http://google.com
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
http://google.com
Resource
win11-20241007-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 3388 msedge.exe 3388 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 588 msedge.exe 588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3388 wrote to memory of 4376 3388 msedge.exe 77 PID 3388 wrote to memory of 4376 3388 msedge.exe 77 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 4740 3388 msedge.exe 78 PID 3388 wrote to memory of 2100 3388 msedge.exe 79 PID 3388 wrote to memory of 2100 3388 msedge.exe 79 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80 PID 3388 wrote to memory of 2872 3388 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff977b3cb8,0x7fff977b3cc8,0x7fff977b3cd82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,18067244680959226565,5197268362979776973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4836 /prefetch:22⤵PID:3748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56e56fea4fe6167bee03d0bc894b686b7
SHA18b613377783747f06052ddbb187746e16f023f59
SHA256df82252c4fa7c73767b7986da31af30fb4dc11fff3d1f082751b90d0e6f353e6
SHA5122d6cfbbf4b00aec098b93ea644330b221721c35f5a85683e6bb5a618705d547b9508aa9ae9282b7ef8569be8dbed0575b4c4d520a75e69156b3971d006c71f80
-
Filesize
814B
MD5df1962ad20b197e6da8b7ac140fbcce1
SHA1b5bfc9a3af18eddd247d921a19cc6a833516f756
SHA256a02c508ff6059c128dccb93de19d69075dad47b6e93db02c62def608198c9a9c
SHA512a939a6d93bef0b4ccac5774172ffd6d9d8b8b5bca5557f91f8721e4581aebd0d5ada48d4dfca67c4e979c1272afff840b6655afb3add8d890dff2b4ab85277be
-
Filesize
5KB
MD5997b75ce6cdb9724cf31dfb2f7c817bd
SHA176223748e6bd4658679059a47b54accbb122e42c
SHA2561f7b82399438e42abf7b27f7d160aad8346924bb42c20334cf81693aa350cace
SHA512e5a519f3d2d945328194b632e23e87a396c2203cc9b77f5d1a06e431670b034bdd2c2d1f2a8f7cff625c997fd6ab339f666444fcc2c6b7c1bf509846d49ef816
-
Filesize
6KB
MD59f8d093afd7fc17d92124d9a322ef650
SHA124f1cdd296534ba59bca3dc8b65d3292c03e0a76
SHA256acd5252e91c6dcae4f94d8cb86d93b7ce785651b97c1903a0fc7fd2f8d43550c
SHA512225c0b8a77494d537b7c348b2fe660493aff8f23cab50481b62e0ee357d0867751a2d29f7bad71baf22e186f1b5568e03dad1ccdca5d220bffab74bfee418e53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD539f6befc4c8f8ba4c99b46175dd05457
SHA128c8360dfbff23b818a94f2ce2f933779e6e268d
SHA2563eaa7fa945ff624a47090f89d9d06a408f22bdf60438044038ad1439244a7c23
SHA5129a5d18a6d30871b4dee89accc8e1b4e89500079787e0e56bba45021364c77b42ab7be276edb723d451b706c4e9ed777fdb73649ca574f3573f4110cd4f430a1d