Resubmissions
22-01-2025 17:13
250122-vrdz1swpcy 622-01-2025 17:08
250122-vny6sawne1 622-01-2025 16:54
250122-vetjyaxjap 6Analysis
-
max time kernel
64s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 17:13
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 102 api.ipify.org 103 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 2468 msedge.exe 2468 msedge.exe 4936 identity_helper.exe 4936 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 3056 2468 msedge.exe 82 PID 2468 wrote to memory of 3056 2468 msedge.exe 82 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 2464 2468 msedge.exe 83 PID 2468 wrote to memory of 4888 2468 msedge.exe 84 PID 2468 wrote to memory of 4888 2468 msedge.exe 84 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85 PID 2468 wrote to memory of 2604 2468 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://linktr.ee/newvistahealth1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb504b46f8,0x7ffb504b4708,0x7ffb504b47182⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,14768282133161774381,355561616303001148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:1412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize912B
MD570828dc6bcf4eb380846bee701ca822e
SHA16995d5ba50eda62e685586d3417207e9ee8b72ab
SHA256d2a0269004d27a3623e1bce94b30fcde3ef125192b229263baee0478a4bfa8e4
SHA512c01c1edd49da300bec23aaa937cb09895cc1cb9b9f1460c800996d6b789478871a62790a3e30a783c64d844675b4396178e12094f634919ce8fe5122e66fab64
-
Filesize
5KB
MD57157d312c28dca29dc5a19a0ff6a2fe3
SHA14c089a9c3a7f2fa828fe204266d29f8c86162207
SHA256de5eb2fecf5c35bcb17d5d2e2b399f0b1da6b584607374e317f104348c5bbc40
SHA512cbdbc611de007b91fa85828431d842be5a3ea1b8226d115a406cf7b9c3a5f6e831d3f45e4ea74a84e91dbe89f8e03d0ba369015a5f9be70c1644c3ca4eb5e285
-
Filesize
6KB
MD50d59c046d58fab44fc7969cf492ae9b2
SHA1c5e57d9a8103b53026d3893ed9d2fd030f8e37ac
SHA25619ee1f7e777e2e480e69c98625cded0ec9dca91b3ed0df7386129a50e03cb641
SHA5129fec93173b4718428e4810e2ae569b1dd2825c15e19ddc7f056c4a68d67887b3b6213175f036778834c56de2516a5c44d87a980126a6a7751e707bf054ac759e
-
Filesize
7KB
MD586a6d938e3c4cf569b30bfc926ff3515
SHA1a4b744cb9f6e14e4de3d6eb854410ea2ae57a81f
SHA2562f7836b92688ede782ea5bb3b162b83b9cbcd09fc4b02c47278fc9ed406f1369
SHA5122b66fc394ef526adf8c807b26413aa705e525f2545108c1fd7e1096959c89ff3c7de23ae17faaf64139024cfa487ace964476b06a49c0bc70918c91acb0c9e8d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57134f02be4684bab9c91e912d6652e47
SHA13737e14d84308d7c1515448fbc162f4f4ffeb438
SHA2566e93ae88690bd21b6e867b23692b5945d739c7370c16ae4da6d1cc3a247aaff0
SHA51211a9ac3a50fdb79f08b18a77c2af911716123be59df4a731d6b3d4d3e2c3c09f6e2173fc9126dd46774ef3afa97ce16b58095c3bb9539b8b90a6c8218ed808b4
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84