Analysis
-
max time kernel
32s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 16:17
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.linkedin.com/slink?code=gkna7CpB&url=facebook.com&sa=D&sntz=1&usg=AOvVaw1RrkcTDMPWdBqZe9a9yMn_#YXRob21hc0Bmb3Jlc2lkZS5jb20=
Resource
win10v2004-20230703-en
General
-
Target
https://www.linkedin.com/slink?code=gkna7CpB&url=facebook.com&sa=D&sntz=1&usg=AOvVaw1RrkcTDMPWdBqZe9a9yMn_#YXRob21hc0Bmb3Jlc2lkZS5jb20=
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5040 msedge.exe 5040 msedge.exe 1348 identity_helper.exe 1348 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 3404 5040 msedge.exe 80 PID 5040 wrote to memory of 3404 5040 msedge.exe 80 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 1420 5040 msedge.exe 82 PID 5040 wrote to memory of 5020 5040 msedge.exe 81 PID 5040 wrote to memory of 5020 5040 msedge.exe 81 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83 PID 5040 wrote to memory of 1200 5040 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.linkedin.com/slink?code=gkna7CpB&url=facebook.com&sa=D&sntz=1&usg=AOvVaw1RrkcTDMPWdBqZe9a9yMn_#YXRob21hc0Bmb3Jlc2lkZS5jb20=1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdef2246f8,0x7ffdef224708,0x7ffdef2247182⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,13864815564180338042,10182139042158119163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:2208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3804
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a7ad9bb1054aa03e39b3554833d0c3ec
SHA1cbd5b99ca100bc2f1292df23bf8e2a5a6f9640d9
SHA2560c3eae39386b4117ad26187afc4933e254468cd12d813271f4b7420cee73c189
SHA512d1d0b77e0bc412b4ee687e849531a7c9b70200d45d0bdbf38357b6fc59af835522e749b2fd8c2d4cde73518970568c38d73416c97381a11cc6029c14b1678276
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5867ccdeae8d98e13b4abee9ee12e4256
SHA147f6fe0a919d015f6a7287aa95cd909b362665fe
SHA25693a6d8eaeb6c24227301e5901c1a67e33d08b94eb4896bfc874340c3cd1ec340
SHA51291c940b2b3184108126f6488bf81e4e967331fe15e03c5879bee404d27fbacb9ddbcbf1fdb317b66c706e7cbcbaef31fadaf26bbd34e4f4c23809eeed797fc55
-
Filesize
5KB
MD5d60151548123e0cf4d432bdbcd4b2c07
SHA1d80eaed79597b5aafb0de2dbaefe0f92e9db202a
SHA256379d4afc6a6af6433593c6562023b7c0976c8ee0e6f32a26553b45f0bdc18808
SHA51208c260cdc253391dcaa03a1a6cb85f058cfc921675a4ff6b6dbb086681e137cfc6ced43ab7b024d4b3b50902c7a4dd8d9959aea30ae11bc3f67917f533ce7ae9
-
Filesize
24KB
MD5e62cc4051e1f8eaa0abda5d730a2496b
SHA1d15346e40b196bc313cbfe5ac96b3c90b83345be
SHA256ffb5b740b8777d010f0d32a120092084c3cd32eaceb937188d698ddc22df2fcb
SHA5123e8f6d89c7c153177b2149d86cd8602ceafedf66f5335a86b19dfa46fc38c47f6ff9a272c3b71b4464a5921ebdf2461fba25692ca916b9715bac520bf1e81a22
-
Filesize
369B
MD5a66944d39db42a9e77f9b5782a4898fa
SHA13a8c1a1cb49493b6d0935205db42455f235e4b6b
SHA256e36acc8201e0ce38e7a9672153312ee3c5c722e68317d0a61719c8e32dc3acdd
SHA512924f25b8d33f596ff605b5a88a6fc99b0e6d5b8950da002639090fdd5d37c926490490426d2f61dde090eb590cb36d758b1e5a3ac1bd60c0471bc714a365bf77
-
Filesize
204B
MD570c4d7a321e863cb36a27f44049ae18d
SHA13a0d574e9b9b1d90688fa3b652158f3ae40e8d4b
SHA2562e25c13b7b3ed401e40d48dd60c3bc3802d0c83caa21784cee6a80ca0cf9c8b1
SHA51250fef299195ed004dbaf4260c9deb6f1d10796b2129d73dc1d29367102dd509fa245f71960a72deed7806c611d9406c886e9498a02dd12417bcd442bfc24f42b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD52e1c1d6b76333be93700fc388cf3b689
SHA16125658d67f3aea23001ffb076f33ec48ca4d762
SHA2567da475f7fc372281ac5c43941d3469898d65bf61272f2c59d827835f24126cb4
SHA512f30f61655eddc263dc49435208e7c8dc77fab8a4d25afd053e42d4576b3d403e9e0eca225bd01ad8c154b2a857ccf9d905b6fca810fe0145441c20001be80739