Analysis
-
max time kernel
167s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 23:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/supercrack10239/crack/blob/main/fl%20studio%20producer%20edition%2020.7.2%20build%201852.7z?raw=true","headerinfo
Resource
win10v2004-20230703-en
General
-
Target
https://github.com/supercrack10239/crack/blob/main/fl%20studio%20producer%20edition%2020.7.2%20build%201852.7z?raw=true","headerinfo
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 2392 msedge.exe 2392 msedge.exe 3004 identity_helper.exe 3004 identity_helper.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1680 2392 msedge.exe 80 PID 2392 wrote to memory of 1680 2392 msedge.exe 80 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 2180 2392 msedge.exe 82 PID 2392 wrote to memory of 5028 2392 msedge.exe 81 PID 2392 wrote to memory of 5028 2392 msedge.exe 81 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84 PID 2392 wrote to memory of 5112 2392 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/supercrack10239/crack/blob/main/fl%20studio%20producer%20edition%2020.7.2%20build%201852.7z?raw=true","headerinfo1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff458946f8,0x7fff45894708,0x7fff458947182⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6712474831542059038,15089241511850921847,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3308
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58411007bafe7b1182af1ad3a1809b4f8
SHA14a78ee0762aadd53accae8bb211b8b18dc602070
SHA2561f274d0d144942d00e43fb94f9c27fc91c68dce50cd374ac6be4472b08215ca3
SHA512909e2e33b7614cb8bbd14e0dfff1b7f98f4abbf735f88292546ce3bfa665e4cb5ee4418561004e56afc5dd30d21483b05f6358dad5624c0dc3ab1ba9a3be18eb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD56eb869eb6bf9ed4eced2e3e3aaecc34f
SHA176c3ce1a34e801ac372a3668f023585d80261f8b
SHA256f4598e6d2a148480adbf31baed4de07adbef28a5935aae877c1223d00f30929b
SHA51291c5e87aa988c48bfe3667763c56946d12899098d92e2da90e01f16dc947c30ea47cbe0497463e26b479e82ef13d59c717aff66c1d5dd00b7f49857e61f08507
-
Filesize
409B
MD56d77c748a815affda97a19a2c41d8a92
SHA14e827c762ef5b586bfc3f7ffbd87ac2d36723e74
SHA256701a731d9f61e7a3c3a2a7c38666e9b73d07167f5c809663defd7f84f4e6890c
SHA512c06c131a7f703bf31730e2161860aaec194ae682075f9822cb4ea628a294cece98ae718f9db3bc909cb45231eff0ddf42e955cb3cb9b2113f38c1e110aedbf97
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5deb23f806c59a7009f0738324e4a586e
SHA140e4d7e5206ef8b07dc721f5bd5a8b2212657776
SHA256fd53100c2dbe911ea2e89d716ca7c04bbb32c7998e7c7984d24016cb91f9000c
SHA5129adede19952ebe05a60dddfb30d15ef91e0bff5dd654c6c80714b0a81fcdfe5fc8df2e3055fac2ba468d528444b89e9cd90d1de197d73cddf9594e26c3120389
-
Filesize
5KB
MD57971f4d05d84c8116c87a15ba77d1641
SHA1afb526936286bbec883d520ac2a2dc0d4339b1dd
SHA256b70451c012bc6154d80d2f635a2f6dcd2306fdbdc66bbd81d3e2d51903398f01
SHA512854ea79ebd16bb2f98870da0bdb5413a983d74b1ecc095ea839556dde4a7eb5aef91367033802ab26f65e71615163146556dd4b9c875cfb412d13c44fbc29a51
-
Filesize
5KB
MD5ee3ffb4b6d5405e3e3c95cd362de08fa
SHA1145db5d0e6db6fae8e9c29f31297c15d63ea1586
SHA256704936aa492d51c719a03b0bcbf1257d52d90f5ebf0907ada20cab57148c08f1
SHA5123aa8a6e308c72e824b5b144ab33283d53a65df1d4f15bee46f797814b47a36b119851b5a309df1da0af71a166fc29ad170326178790b248ac704316fef84ae9c
-
Filesize
24KB
MD58caf4d73cc5a7d5e3fb3f9f1a9d4a0cc
SHA183f8586805286b716c70ddd14a2b7ec6a4d9d0fe
SHA2560e0c905b688340512e84db6cf8af6dbdfe29195fefde15bd02e4917a2c5fda8c
SHA512084ef25ea21ee1083735c61b758281ba84b607e42d0186c35c3700b24a176ada47bf2e76ed7dadd3846f2b458c977e83835ced01cda47cdd7ab2d00e5a1a294e
-
Filesize
706B
MD51d70f3f957109dd77588ff310599d4ec
SHA17c131486a79a0abb9fc3de9d92bda76221cd720b
SHA25698807e746b8e03510a110675dc3aa8cd4a8df4c97bda3d6766d2a11686065b26
SHA512700e6e0ca052a74804c311314f3fed40f34b1b55ae33fb2b09f9e460de9e3bc30a8380f98d05c934248ca491dcec52742a447d4a3c16288493b9001f407ee622
-
Filesize
706B
MD5b06a77ea9ebe242d0b989f27ed24e377
SHA17cfe4ab37068047a786cbb4e593307777a71af64
SHA2563776c03f45da52d33170064f499a75f6f4414b89c94746ba53995d6a707725bd
SHA51238f154ff411774d09338c9db2e1a719a71d665f06826bb5ba483e769de9da6fc8aa36901662044f5d15fb56db85d940423ebdb85219977b4f3064a062f0469d6
-
Filesize
371B
MD5b0061a5f6f8881b5c1e7b2cefcab9404
SHA1df92fd444e530743663809580d98e85ca860bb11
SHA2565688fbc3952fccd8925135702e5cf80fa60b83afb751e511e3917299157a41ff
SHA5123de33af4407c920d40b505a0f89ea846aab4f8009850ba19aacfb280d82398eed63868de7196ccefd265a940c5f73d7ffd0726f7e93502f4c4505a61daf08acb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD56e8746789a819ce0a2e6a4de2a990e80
SHA193d365db275fee0c556065518ea9e229ca814760
SHA256967b37b2f4d94e7025d7cd3c8937bec1f2e8d8edd1d9b7e71e67300e22ab24d6
SHA512148d81a891abbe1caf4de70ec3923d46b0eb58281d8288dae955b28de664007490d66e3edc692267acb68c5b705a6d1f29f0da04f06c7d41227a838bc91af4da
-
Filesize
3KB
MD56f641f1b7d405acecf2addb5efd83328
SHA1d009c2dc8cdaed14d0cfd47fca9a73b90aa1ea28
SHA256531d01b4d56f35a0bb354b2bce7f07af48a23074639770393f36b5f626187586
SHA512ad1ec5bc7812ff00f78143a10a51bfb36393d91248d0fdc90e35fc202ebcc59397b67337af79a2a9ee3506f7c8179f07be8e17a1961916d57128fa04cb2bcdb5