Analysis
-
max time kernel
58s -
max time network
60s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
18-01-2025 23:54
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "186" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 1968 msedge.exe 1968 msedge.exe 3664 msedge.exe 3664 msedge.exe 5056 identity_helper.exe 5056 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2460 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4664 1968 msedge.exe 78 PID 1968 wrote to memory of 4664 1968 msedge.exe 78 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3476 1968 msedge.exe 79 PID 1968 wrote to memory of 3544 1968 msedge.exe 80 PID 1968 wrote to memory of 3544 1968 msedge.exe 80 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81 PID 1968 wrote to memory of 3384 1968 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://stenmcomnmunity.com/105382409641⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff800953cb8,0x7ff800953cc8,0x7ff800953cd82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,7632502311606950564,11299788424846109942,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,7632502311606950564,11299788424846109942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,7632502311606950564,11299788424846109942,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,7632502311606950564,11299788424846109942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,7632502311606950564,11299788424846109942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,7632502311606950564,11299788424846109942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,7632502311606950564,11299788424846109942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,7632502311606950564,11299788424846109942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a12855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5759c7ba9c2ed4758a7be66d10502628b
SHA17b34891cf2b27400708243d36d522b8e8eaa3c8d
SHA256393661dc816a46e5dc4623b154fbd81c9fa7c287134eeba2bce72f79d02d7702
SHA512579e6acc0144cd97977c8e8acc615928aaa9243affc96878175584d6d9db1f0ff261c912e1f458a3cea2ff0419b53684147cc97e0fe2ea436b3438a596416156
-
Filesize
1KB
MD5d26c24f7c842f0af2598e0baeb62927a
SHA13ae7f655cc70febc291705b8a6fd25784f8cf3f9
SHA256e2ccceae814fca4af2a84a2f85cc525b1d1f318a0733eaa08725891d65eb4b18
SHA512382189ea26d9f9386bbfccaedcc81b5399e3478ff33ec5ebc0654a4d76bfa5a9fc4fb5a9c61fb9090520bfdcbf89670fbf39d2f438428d29f52fe1d527c48d21
-
Filesize
5KB
MD59647abc33732c36735b6abb2c765a224
SHA18e4b2746aa8fd5260a0ca8b4f1317c7fe57660a6
SHA25648eb832e63f956925a4ce9509059da5d7d1782ded7a3db902a17ed8371bf9433
SHA5129e893fac2304a20f1dd2a0c3f7e2018a6528c942d5d883a7c721aaaec2cc60251756e42906e081f5452ae576b6eb028c3a71d5d61834d231b71fc99bcb2d667d
-
Filesize
6KB
MD56e26339b769647d291d48a203ced256a
SHA1f29091743078999869a5fbee56ae32cb14bba1f3
SHA256bdd3a67070390d3a2dcfc70e777437b2d8b67fd249ab35383ee5f91cea825e09
SHA512adc3e518a5fd34f211c726df95f1f8beb6cddf5a6c8729b89cac6b3774d127f9f853626d7e86f0309f2d4f8e5fcf91ab73a0fa5632e687d24944efbfeb61bc23
-
Filesize
6KB
MD55d558d0c1624203b9ee12c5fbe3c7a15
SHA14467aa6ebea318a56eebd456a36e4241ad0b8f33
SHA2566506c600f4e561aafe8c5a00b6aa8baa492220573ca84f77e03d059026612e90
SHA51221c85b4d4dc6f73e020947dcc885a849a6cb8ec1cb43e9dcd13a98a0f9b336ea0a28f574f116de89a2fce6563ccd144725463da9b5a53425c7ad33258f92ec52
-
Filesize
6KB
MD51a1fdec2bc96fd01e5db2dbaa58817e1
SHA13717eab610ae619079fc3cef0b961ef8267da2e4
SHA256dbcd487209bdfc635ce381dac550eea8467fd26187b808e2ff93a2c9a3e9836d
SHA51283a703b79c64719bc29cc2d1570e27cc4a35fe281af0ddee913479dc5da9ff962063bcb3b380e659d55f0a2e1f14131335bbb0321f3c3c3788f7878a24fe138a
-
Filesize
1KB
MD5e29c2b8bf6d2e3b599a2f577d8ed5ebe
SHA140dc8ea6a0d711eca9796e008d859c4b31b59274
SHA25611136554408ef2db59f951cb32f040f1368d4588410c940b3bc17ddaa15568ce
SHA5125e6afa36bc238f236be3f7cacfb4a96b697e4f6740c72b6c212f860a6bb48ed1a097869ffc60889879bd4e405430935e296e319e4e27beb804a845d35dde7afd
-
Filesize
1KB
MD5618720aa4de1b35a46b9bbd4364cd926
SHA18f693663089ef5e8806f36bb5cff7cfcdd21b88f
SHA256f4d7b7505183237ec1784dcd45f626350affdd995851d27159d31d632d0670eb
SHA512600bedf2a922a1978071d309323d14ba591089e0d0d852bb3199cd1481f8bf5a6359dbd2c00e52f8455733981a3474170053580efce533117a604b30f50e8a55
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD529ffd3a1cfe00c5b30234ddd1403a083
SHA13d8da826616fe51450dc91e1cdb9fbdc81661fcc
SHA25625abeee193fcdc93659022eedf680ff664cdf21aa98de11c8ae270db747db3f4
SHA512741b9b8ddcac532ca9c18ecfca626c0a737d1a26feb9cd4eb71a3c8785335c8ab84576cf24a74fe8e14862eeb85038e9be65590acf141194b9f86311f3c0ffb3
-
Filesize
10KB
MD526b35efd3379640641d34505ad112a4d
SHA12627b00453181b5b84292785e2741480b0bd9952
SHA256b3b3b3a8e3a339d59ce498b3ca2c46833fc4770343c96a70bb6beb0e10b088f2
SHA512cc720e91097924cc26e44831c94b3fe55a1e6264b89611cec1f8ee74d4b797dabf7be3d0d5ca9c60f120c26b65bafdd95d8ffd69f1c179bcaefcd3d53c295aba
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84