Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2023 11:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://linkr.it/2NfnOl
Resource
win10v2004-20230915-en
General
-
Target
https://linkr.it/2NfnOl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 3236 msedge.exe 3236 msedge.exe 2640 identity_helper.exe 2640 identity_helper.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3692 3236 msedge.exe 32 PID 3236 wrote to memory of 3692 3236 msedge.exe 32 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 3828 3236 msedge.exe 86 PID 3236 wrote to memory of 4020 3236 msedge.exe 87 PID 3236 wrote to memory of 4020 3236 msedge.exe 87 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88 PID 3236 wrote to memory of 3748 3236 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://linkr.it/2NfnOl1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe345c46f8,0x7ffe345c4708,0x7ffe345c47182⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 /prefetch:82⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,523396037235872598,16490671495837490751,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f95638730ec51abd55794c140ca826c9
SHA177c415e2599fbdfe16530c2ab533fd6b193e82ef
SHA256106137874d86d602d1f4af7dac605f3470ec7a5d69b644b99d502bb38925bbd3
SHA5120eb01b446d876886066783242381d214a01e2d282729a69b890ae2b6d74d0e1325a6bd4671738ebe3b6ecadc22ceb00f42348bad18d2352896ed3344cc29f78a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD543a47caad0bef1b069655b295cc2fe60
SHA1f8a2157b2406ddb54cfaabdac0324c19c48dbe5e
SHA256a20978488d30f1eb6febadb093a2606872700b7292c3e52fbf1e2b21b587481d
SHA5122a3d95705c071a7cf38c4b38b279e79bc3cd06f44d93f8ed43ce8ca344393bd58c82e96152ea55a6b15dd679661057b7962233833a06af83d2ca502d595b97ac
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
659B
MD5190a56fab74ccf62da7495b96e5b52eb
SHA159f94262cae494c48592dfd450d22f0485087e5d
SHA2563e0e98a16bcdae9bbfc22649bf0a51e1e988c76d0664e722bfc1377f0d56449f
SHA5129cc49e8a03095eed74e0109dc2f5c0d4f5e8ca7be185dd9319f195deda1ce5bf0b3146ad39f9a9bc7329c82f89fbea8bfa4bc5683721192ad32bec7825038c1e
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5c444e7b3bd4e172df32d22c2209e34aa
SHA18a752f4d97b30a57736896c6bc691674fecead9e
SHA256cae94e961ec8b49f432018e7a2e3184ea8d9c9b69e10afd6ed644de011617969
SHA51280fd85763d31c4e07ccd695d468326c92d593c419272e284b454de864fc959b8452633e92f265140112eb7b621e6745ff7c01f1514cc726c330d270379685a96
-
Filesize
5KB
MD55deed8f34b7e6b39c6cdd71c2da32782
SHA1250279c7930756846d5491f6adce840aa55956aa
SHA256c0145cbe3e0a004ebbba2f2d3d0a75aef1c8d6950c8eaf5a3e65d8bae0eb90da
SHA51266da97227d41298f5416d35ffcf02221191720d0a8f80a1704a4f3b4f4170339815e506a36391066db13e1b4af3e8507ca852516c4cdad5f78e87bf616667c8a
-
Filesize
6KB
MD55b2cebd3eca49fe2e873ea39d9980cff
SHA10f75a50475e72e489805750b803d42b87287af87
SHA256bc6b148d29cb0f360c6b2c09e83d7e00675d98b7601339ae5bb44925c5d3cbaf
SHA512c6b79739c335a1f2b636ca14eed14b95d3036292adcbefb57b6c2676050f4ef12fc0a6b32a7059ca0c3819d9e5e66752ef2a0a56cf3a383d02642dbb86b7da43
-
Filesize
24KB
MD54a078fb8a7c67594a6c2aa724e2ac684
SHA192bc5b49985c8588c60f6f85c50a516fae0332f4
SHA256c225fb924400745c1cd7b56fffaee71dce06613c91fbbb9aa247401ccb49e1ee
SHA512188270df5243186d00ca8cc457f8ab7f7b2cd6368d987c3673f9c8944a4be6687b30daf8715429bd1b335391118d0ce840e3cb919ff4138c6273b286fb57b2b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD535cfcaa4c099b6660d2294fbcd579bdc
SHA1cb534256116a1d1638e4f0bf39290aa3dfdae81b
SHA256e44b520ff35cefa10489b6696277b8b257e2f49871f5a4f476bca45bae0885db
SHA512f8b9f1c06ec5b4d6b4d5b3a02b8f9d56c57b936cbffb117ce6c21662cab7d35ed28e919a2c2c212c75eda549d04af0b4b75772f5124a2de9deff67884ca9d09c
-
Filesize
10KB
MD596800a51b0c1779eb2d8b650cabdd44d
SHA1c1586b571a9d8927733b896bfdcad9397871c750
SHA256e3765f681a2afa6236d152e6e1ee802e89b5924d03d9e9f009951f5199937041
SHA512fc34663140d6b34af61e6a95d2efc9ed9a818e1cd622de56157358ffa0893f5e7bbf7b3da6bc02884be3ee769602001a98c39ccd825d1d61dcbd2e4abe1cdb2c