Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 00:55
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
flow pid Process 49 5116 msedge.exe 63 5116 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 4024 msedge.exe 4024 msedge.exe 1816 identity_helper.exe 1816 identity_helper.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4572 4024 msedge.exe 85 PID 4024 wrote to memory of 4572 4024 msedge.exe 85 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5036 4024 msedge.exe 86 PID 4024 wrote to memory of 5116 4024 msedge.exe 87 PID 4024 wrote to memory of 5116 4024 msedge.exe 87 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88 PID 4024 wrote to memory of 1852 4024 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://tinyurl.com/5fbpz2621⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd747d46f8,0x7ffd747d4708,0x7ffd747d47182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Detected potential entity reuse from brand MICROSOFT.
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,12858316001927186355,7208803608235401914,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5cbcca34e26718fddefdc5a8f29a24f6a
SHA1bd122b0733949a2b578985decf0a493b51194bf4
SHA256bd9448efc2f05abd008c9b9544bea8a4abe0c06cd209f50ab0761a64330f7f76
SHA5127eed0a4657ab8012041985b5a623948ebc33d49cde663e65b42a80295452fbd443a96f93b3effd04d7472a29e41b90f0294fb6fbddf4aa7a19710038faa7f6d0
-
Filesize
276B
MD574a8d1f6aeb9d498ba3a4466db36737a
SHA12fb3d828fde8af0dd113d1a00edaad7910857ff1
SHA25641355e557f63b6ca82e7a76f885c18777e3f91cad8cba7e749ddbf7c1e1938bb
SHA512253fca8c393b9e6bae02d2e56fef8ce32e6c86d3844a177f121add6136e8310b4d3ab89c41e51ac05262ffcfe562a83dcf2f5b37bc094415f9db85e6567d1fa3
-
Filesize
6KB
MD54f57dc6d0eca5e2643a442698b418a08
SHA16704d489f2ddd782a2b16f7fc2b5c87cf06640f0
SHA2566c59efecfc95762f44a3aa08c9992a7586fc1bdac09dc870f4dff590838eeedf
SHA512e546db8efcd1f588601910cfcab4748b15ad0b2f753e99172477cde783acba2f958aa37c3ccab9f413015ce3dc2438a63975ba77104dcfff1822125a989de193
-
Filesize
5KB
MD5fb42c43973ca3a15213d603101314377
SHA189ebfd07c4e2c32ca9851da0681ec5a37445cc0a
SHA2569a33a388e027ca23dbf5b08cb386f3ac0ae605ede73b25f6345cea465a905ffd
SHA5121212b92a4844217488f9d9296b5b4c768497cbc8c97f6b74a34ff742a80f14e19a2bf303ca84f1c549dee1ea304b3677e920148fc64d8f9d9f9b30438c4b05ed
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59a47268759fff0be4048ff217c2d168e
SHA14630121f85dcd8850df6ccb40e78f9ab80656dbc
SHA256cbd50da1dc7ed4a725183202bbddd41c260ac6191df44d6a5cd85f6b0dc4ba7e
SHA5121f2743d904e8ac40d3dd6fb47c3dff42b9f44eb841ede2e88070685aafb2ab30b005648c0739747a0213234e6251fbe4f44dba0a3323f3a7e55f04be93d1751f