Analysis
-
max time kernel
68s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 01:35
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 5088 msedge.exe 5088 msedge.exe 812 identity_helper.exe 812 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2432 5088 msedge.exe 82 PID 5088 wrote to memory of 2432 5088 msedge.exe 82 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 4336 5088 msedge.exe 83 PID 5088 wrote to memory of 3616 5088 msedge.exe 84 PID 5088 wrote to memory of 3616 5088 msedge.exe 84 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85 PID 5088 wrote to memory of 2072 5088 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://stenmcomnmunity.com/105386029851⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa202f46f8,0x7ffa202f4708,0x7ffa202f47182⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8452189129224244264,782292186247773684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
408B
MD554fde0551e1a3ecc9cb144fddbe367d3
SHA1dd54f27f2c73961af96f1688621fbf49c4926d42
SHA256b097ed670dc9bf22e26a02775edebc34e39cdef7710d14d7e084453fa3293ddf
SHA512d87c4bbda2368fa78321c8c822b98baf2382a82a2f5cbf3e06f8915b8cc7da2dd3f71cff20e01dcfa3d6586eee9ca92252309310554c924ad8da2cb6dade5e7d
-
Filesize
6KB
MD502e7b5fd698ca814e9e76fcee96dda74
SHA1bf271f6b0bcba5b23dd514fb78f5c1f944efdb2e
SHA2566c0cca562bd76087ca09b04035a1eb6fa1382c172339524b523a0cd03518ade7
SHA5126daff36f097b429796b1527542a384ea5492d485b900d5a6b52003df51a7f09d95fa3dbaeb75785bdcd9e439503a68c206c966a82c3972764f2f9c57f8f85830
-
Filesize
5KB
MD52a13db096ae38b9669f04c206a93d23d
SHA1783c2d25365e190514ef7efb5db09a9b3c5f4370
SHA256324197b53634f80529a3cfac0f63a2ec9bf60de40f413b383a33596feb18cfb0
SHA512d2e697899b732269f5b8d96328895db3fce508c7ca180a4c08b61f3d3d71901a1306abe7e24d19f149693b63accc90b05d8b69230370979b73e7f3a78a840761
-
Filesize
6KB
MD51f97639bea4f77b321b241dcd042c6e5
SHA1ad2910013399498caaeacbca071142dca280fe1a
SHA2566cf65fc9d47191d132e9af9fb3a366ef74068bab6565e24f1f3c4499f764d1f0
SHA512b79442cd63e01bae066edfc8956e762357aafd80f3fb9c25f0a01724ee84db84c2eb074fd8c4c734775cf78bd52e413849a20e614d267004b295d6c78f7c3f2c
-
Filesize
1KB
MD5d2f82d08d51841607d75136ee203cf11
SHA1b10df782345e47a5a2e90ecc9c6c18e5f2071cc3
SHA256ef7dc89d13b6e76be34689e681c141bf44101de3a128f44fd69c46b84a99335a
SHA5125b3287650a3bdeceebe1317c963f55c0dacf7a6f88e745351c734847ec81d1c04e6b5dfd857288f105a44edc22f1ec8def88f23fbcd84ae8ee6f806705c97a1b
-
Filesize
1KB
MD5e1492bdac5a2bf1ba72b06ae01ec28a6
SHA18c54ac81a11ac8b9d79aa7b9e1af83e7bad9896c
SHA2562bf3ea0209d17021b4d9a083c896bac99bb0ea1b894f551f7c28613031139b67
SHA51283bbf2ec8a576f505ed6d6c704be1afc6a08d4e27705238c780f223e0a26158350a3c9e46cb1bd785ba93108edcc02d97324eb738bd6c84439115e2b870d1bd0
-
Filesize
875B
MD589c24f6f69c13d4e2dd2f7eb28de4919
SHA12b4c13041ccf29c0ee2ace6f38521b154bb01964
SHA256a13486d244182eaa64ecaded7c7d0fe26b26de62b05aee05f9923a7ba7d6c43e
SHA512e50a1f76373df16fead3f84bffff66cec3118784dba47e44f4f2d836a61cb16d1350e5b78a5de503e8d77bf678edb29e0855ee16909126f60618c8d76bc5ee57
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5899f38b5f264d87e34471e12fd761e5e
SHA12daab2582b83bf49fa398ffbcc5f0834f6d27fe8
SHA256feb724b9a73041db586b057f63f87b58ba6f1913ec0b6f734fa1e65f77fcf23e
SHA51277c512b6eb50c35700a43854f7163360d3a2a3d5119a5c3793a4a646b3a56c791ac2c0c246fad518b851e84ecafc7a3192673070b09af682d1f3fd56a48a30d7