Analysis
-
max time kernel
84s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 15:45
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 1144 msedge.exe 1144 msedge.exe 3420 identity_helper.exe 3420 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4480 1144 msedge.exe 83 PID 1144 wrote to memory of 4480 1144 msedge.exe 83 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 1320 1144 msedge.exe 84 PID 1144 wrote to memory of 4368 1144 msedge.exe 85 PID 1144 wrote to memory of 4368 1144 msedge.exe 85 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86 PID 1144 wrote to memory of 2608 1144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://staemcomunnitly.com/gift/activation=Dor5Fhnm2w1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb0ca46f8,0x7ffcb0ca4708,0x7ffcb0ca47182⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,13513141615998039198,2315096926204257396,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5e494e63896008e2bfc9039b700f165e2
SHA1cfed6eb5f243b24188672a308cf9cb2ca5d34454
SHA256e8cd532faab7632ab2d27fe52e15ead72ff171fe99a4f7d36b1bd5e38fafc6d2
SHA512ca05f6a055ee489098bb890362c35e554176d3ea5f9ca6143d1f54efbaa741c526b6c9d00ce058499571bda1571558068aa557d91a1219be6d0866d92ac8e270
-
Filesize
1KB
MD5c1d85600928b4428f78ed60aaa12c9ba
SHA1ef40754e056bd32098dda39a23e83431c075f4ee
SHA2566daecc0d71f7e2525d0f7a0d6c904dfe9b0efc8573e8eae7da28c0ed2da1699a
SHA51200ccb88400be4b5e945d52f658d97feb6e62c5df24760b4201f00e9708407dc2c60942fd60b7e7a1a7992d32376e07b293ec24d6900ddcab440479c3d82395ea
-
Filesize
6KB
MD5e82bbbaf857e1f3fd1f0c0e9a37f8d0c
SHA14fb6ffe85795582e466187c1e71a2b2fc70c5cb1
SHA256b801920939ff7f1f0bed9dcb28dccd24e3dd35e93d5032ca670aa2104e2f38fb
SHA5124098c3c2ec6c950d352a1a0fba7a0fc49ff5943ee906cd2b5ac6b7dcab1905e81abc41cd127836080da90c36bc7dda31c4238bdea2d6b0acdb8c46876d42ca28
-
Filesize
6KB
MD54cf727ef700b8d9520f156f16f0c0f61
SHA1d6d2336f9d6ad0ac88b978f3800341284d68c586
SHA256c510b2c18db88e58427ba41d165573a111470c54f2155cf07d91103bc5e59334
SHA512105beedce49e3f6b6cc33a4a6573dd13a75d05fea1d1652939b581af6c5c4d17e30c5d0ef8d02a415b4ef89b36d25f4a1bc4c9229aa549ac606eb0f107740988
-
Filesize
5KB
MD524f91241f6652e67371123457d7f630f
SHA1552453466b6cb513be6a67ceadf636735c1b906b
SHA2568fd88b07509ced01e7cc85ab83c286142ede8aef6a2662cbeb5d2379700f0d37
SHA5121c8bf257714992beb470ee910e9deb90a22cdb6118790b9042647f333c84920719fe6ba4364dff69628f96e7c91f0d893712a6b2506d0d665852a3535e4a64bd
-
Filesize
1KB
MD5c822e8dc3c50d19d7487244fdaca6b55
SHA1a7f471b9a7f0f11ae7026473cc129bb732c04869
SHA2560e6f6e0b5573b88b22961afaaee2d167ac66dcd393d7658ca71fe1a474d7416b
SHA5123969e17727223599c2cb82c6aa395bba1070f2eb7ce9d33cb005743767ab79a5b56c7e4eb7eb307516245078c9b2e6c2ff042ed5ff45fe91c3e91b453a9dc6e2
-
Filesize
874B
MD5463bdc9592c90af721bdacf03d19ad0d
SHA1fdcc8df4524af437296256775d323f6334426a2a
SHA25655cf38eac93fbde6ea2d792361fad0c52f52fe8cbcdb8cfecf9e60b98d8d347d
SHA512d6c30f0d28601899fb4cd1af317ee419ef33dc98ac9dd54af90951baf4cb5faed403ab01b666a9bab94f4d9ee19cee66f530c4d8837eb2f64f143d09e52198ae
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f3e55c4240e7b0021d4c18291affd74f
SHA1edfe600e1deeba76b25685b954715fc3f43ac3d5
SHA256aa9fbcf109acf1d36cc21f93acb1e4d402f5042fba213af1aae75e4f07c8c52d
SHA5125298fb008fe89482986ff70c64d05f18275f91f6e3e634e3a314f06eabb22c91b320552ef1917b54e5de7d3e27d2ee17f78b784ae933fbef866aef34f3c6b7c9