Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://microsotfmailnwrksx.krkonqghz.ru/Vt2VD2f3/#https://outlookmicrosotf/eiknWtBFJP#ZGVuaXNlbUBiYXNpbGZyeS5jby51aw==
Resource
win10v2004-20241007-en
General
-
Target
https://microsotfmailnwrksx.krkonqghz.ru/Vt2VD2f3/#https://outlookmicrosotf/eiknWtBFJP#ZGVuaXNlbUBiYXNpbGZyeS5jby51aw==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 1552 msedge.exe 1552 msedge.exe 4336 identity_helper.exe 4336 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3640 1552 msedge.exe 82 PID 1552 wrote to memory of 3640 1552 msedge.exe 82 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 2424 1552 msedge.exe 83 PID 1552 wrote to memory of 5016 1552 msedge.exe 84 PID 1552 wrote to memory of 5016 1552 msedge.exe 84 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85 PID 1552 wrote to memory of 2484 1552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://microsotfmailnwrksx.krkonqghz.ru/Vt2VD2f3/#https://outlookmicrosotf/eiknWtBFJP#ZGVuaXNlbUBiYXNpbGZyeS5jby51aw==1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb3346f8,0x7ffbbb334708,0x7ffbbb3347182⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11958491738387325616,16441488474102281552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:3632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
5KB
MD5077a2d0f5353cdcc5fb8c7bcc684dddb
SHA1c703cefd9372cba364e32b9b03dacefaf5a08fa4
SHA256e3c8a38d30d0f34186f99c43df63dea14c88b1cd9550d494ff0898e8764219cb
SHA512c8ad446ccd396876f9c354ba2d38540c077f0fbcd28a2bf5497381c89c157db5bc417d74f2280426a401bf51348fd1e0e034f479eec90c36f8bbd9d45b4821b1
-
Filesize
6KB
MD548a5d744285bf971830b77e276092873
SHA12c17b1cb60e2dc8f78654e9b1b7d67639cbdd6bb
SHA256f50d2100cfa2ecf61dea9ca26c6d587e59f218f365cff74b88beaa97e6d3d382
SHA512cecf13b20e70cce08eb4cf82d677ff12a6889e3fbc3b3647cf4ff3c577cff9b257602611aabf9916bfe16740577516adc4efc8712b6bd4257efa6d4d80b6a54e
-
Filesize
874B
MD56ed1a2217e9374fb72f1a94fb88554e9
SHA12bd26b26fafef87cd5302a5c0909deb7922c7532
SHA25650799b9cd251d25e3db86abe890940544f508eb8ca15e2c62eecd090428327d6
SHA51218959646336a29312175d7a0f41ca93b19a7b2e1257e29b66d9f7f5a3fd70b0ef6808b9771b700252265ec9966f5074f5e06ff65c1eaac8ed91ba746a4bc6e48
-
Filesize
874B
MD52e4d4f5812cfe98fb9c5dedec6fdf09f
SHA153478dea6872473f68f29b0e5180844884ef95d5
SHA25622a32939aafd2efeb7968bb836a6f907b4b2c6bf0b01e1f3b4fc1cb4db8027ae
SHA512dfb7d9407f3879fa5b7dc99c7e11ad2a7d69ade0a3dfba800cfa96c42c69fd4d94db8b5527e0acb22da49d2c4dae60fceb07e99fbf16846596fc5e4550b579bf
-
Filesize
1KB
MD555daccbefdd459fd683927bf1e0a18ad
SHA1155d523497fdd1d93e5cbe96bddb2c3239bbef65
SHA256df5b17f27432cba40c2438001c0bd373a1ea4e7139d88a0f1f2084414dcea4b0
SHA5121f2b6ce9924bf7c55662ca4ae3a2a8ebd78d26f183bf5d457919970bf6cd8126f437a0b9b47a350cde36d0a0ddb0564960732f21e184bdf8e38a2c4a1efac84f
-
Filesize
706B
MD5ec7b565ffc036a533318d18758685951
SHA102544f08b11836c1f2885240cc3f19d9d8f115f0
SHA256975df2d155f5c62c6e1e43d09b97f36c038be06e3ab3952142837cbeaa1e99a2
SHA512cc9c3533e0893a908c3b877e81e939249641a3aa4d5c1dc778317e9e97b41fef746c5868c4d5a5dfa3c9b6008a17946a592437af39c2e25b686476f18a3bc725
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58b49fabfe967673dc8ae525dab14009c
SHA172368388c8d9f0058987bab2b1ff9069cc4ebf8c
SHA2568791719f8df87ba55d3e6011423d75070cc9f031100a570524e812c68cef61d8
SHA5127ae70cec2bd3bee848f70a3a37cdfa6b44c30fe019706c54ff25120b5d5bfaa1ff8b1793ae95502692a31053bb6c7f4ac82bfd262fe0562fdd252a834f98fa8f