Resubmissions
10-02-2025 21:46
250210-1mnljszkbx 810-02-2025 14:17
250210-rlv5kavmfs 1009-02-2025 00:38
250209-azdzrsyrdy 808-02-2025 03:36
250208-d5zp7ssraw 108-02-2025 03:21
250208-dwdrdatmck 108-02-2025 01:29
250208-bwdehaxqe1 708-02-2025 00:52
250208-a8cs3axncm 307-02-2025 23:16
250207-29ms7stqdj 907-02-2025 23:06
250207-23n3patnbr 807-02-2025 20:22
250207-y5x7laxlgq 7Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 21:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://noescape.exe
Resource
win10v2004-20250129-en
General
-
Target
http://noescape.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 3060 msedge.exe 3060 msedge.exe 3588 identity_helper.exe 3588 identity_helper.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2388 3060 msedge.exe 85 PID 3060 wrote to memory of 2388 3060 msedge.exe 85 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 2540 3060 msedge.exe 86 PID 3060 wrote to memory of 4752 3060 msedge.exe 87 PID 3060 wrote to memory of 4752 3060 msedge.exe 87 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88 PID 3060 wrote to memory of 2484 3060 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://noescape.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e9f446f8,0x7ff9e9f44708,0x7ff9e9f447182⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3893448685255871663,17307214561466548074,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d071abd21ba95452bd70e7274b2139b6
SHA175ea5ccc5ad04b9634e377b286fc99c448f07891
SHA256973e07a348e7b2dba242b74f59a5d3d690842f19be76dd15a5e693992f08f142
SHA512af42a390439b837dfffa305f21fb573b6f2028bbf767d7dcf239900fbcbb8d4e7015d37a8c52bb513bad60f6f5039d4e699acf8b5135b24e8d0e26a1d96d9b5f
-
Filesize
152B
MD5102f253d13f1fcbd58ff7ea07502d0f9
SHA117fa9662f4778117d415f7821ad2f9eb549832c1
SHA2566d75e75b1174af3c7b730d9d4a397e5c1b53c6935f7c4ea675da4e42a9f6559d
SHA5125401a9bd5aab0b6add34e79e644916c3869198b3310c47aa8a845ab2d4d566d973c2a56e888c675c96bd04d2e1cbc756189f9122d6ce4b88cdbcbe1186ca7eb9
-
Filesize
6KB
MD526bee44a48f64804b3d56bdf090d8efd
SHA19ded4e9dcce5c9c8967839603a587e09112a82aa
SHA2560259f0b53e2b546830b6cbc5eb984ead17b3e3e37fcf1df32df2a124b0adfe1b
SHA51225db540e9f0fd2fe10d216e815c6124212b1561437c071a1556d520619ccf0f29fa7584d53288bfb8f845210c309db038e79e604d59c65aa51ba5393ccf55b5b
-
Filesize
6KB
MD596606c2daf67629b2b61b1875dfb9e6c
SHA1cbdd13d279ac4fce333860763d787e8c40cfbc09
SHA2560f59cc96c5de68c5484672aa8774254e053502175bd0abec93bb691e55edc4d2
SHA512e11770a9b74d9d2bb207ceeb6acaf67b8fb942a537c1c0301f13338d2703b3173adb3c06a6dfec482df7087155b6fcc278a73ad93d81ad7f39c7e03c82a05abb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50bfc4208530e72af57bbb1afe6b29ab2
SHA179e164ef4d0f97b544cce08908b23a3da56e10f9
SHA256ae125763342c39e29e8ba098ebee988481010d49fc8e4799b3196ec4be186e1d
SHA512fcacfd9a98a986cd63bc52690123734f06d43da0ae5d8dc3c223d7b07fdee6ac5bf83ea8dc7d5e9abb39072b847fde75f9f5db692159b93686e274a0134df622