Analysis
-
max time kernel
27s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 13:14
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 4084 identity_helper.exe 4084 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4932 5072 msedge.exe 84 PID 5072 wrote to memory of 4932 5072 msedge.exe 84 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 2528 5072 msedge.exe 85 PID 5072 wrote to memory of 3532 5072 msedge.exe 86 PID 5072 wrote to memory of 3532 5072 msedge.exe 86 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87 PID 5072 wrote to memory of 408 5072 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://steamcommunity.com/gift/activation/id=156114330551⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff869e46f8,0x7fff869e4708,0x7fff869e47182⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1820,13061601737688180417,12876405897818608799,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD5b455abf7ae9ceed5b2b0449745861d1a
SHA1574790d72b38755b198074f72482cb4905dae0de
SHA256e77e7cba45947ba76ff85c0de303426c8e10294f890f28d4579ec099507d0cfb
SHA5127c2106473db67bfccdb327e7186c8b58c6373b0405b1163158e5d8a17e40e5c4eb4fa48b777808dbf7924897124f858452fd16b80fc8bb73862662f9ea076dc3
-
Filesize
5KB
MD577f4aab26f3dff676c9f0c77fc78c3dd
SHA1b5f2bdfab716f524bd0ee0c14b3040177d808ec4
SHA2560a2753bd654088d8524c99d149907ba4451ad421e0a79fb634d13d410507445c
SHA512f4be6f8eb95f98484750757564920eb0c15f4ead3fa3a842396e769a155b2a4b4397439c7fc238c385c307a42f48af78ebae8dd2c64a24fde5c8bb2e28b32594
-
Filesize
6KB
MD5f0062a28fd71447e7b1e4146c889b59e
SHA1c9ab880ab1b3f5676c45fdd9a665c6d1634ff62a
SHA25696e9b6e27f1abb16610dd847cff62c346a10d4e1f39642c65dcdad9a059e5db8
SHA512f675a4702c5b07ef54bd6b5354592bc305c294035520d49dc5f897145e8af46bdbaff3a88b90181ecfd393571475d9905e35ce969f7057d7c74162d7c5b98c6e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57c84add39b8e0070e5185d9804ebc6a1
SHA1c737491e7d950d0d0827767053379a05268d3b1f
SHA256b244085fe95464f6ee89132b1b0fd5a08df1035aa6005c161e6dadf42e21f6e1
SHA512b5d9a9314502e59b0b0a46fa86c59016bd6d63b973aa85588a6bdb92f7feb3345edaf706ba212c7bd1082414fcb077c8c4fd3c5c696c9d0e0b974e76d2011aa4