Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 21:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.co/LZiOmLaGxV
Resource
win10v2004-20230915-en
General
-
Target
https://t.co/LZiOmLaGxV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3888 msedge.exe 3888 msedge.exe 3668 identity_helper.exe 3668 identity_helper.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe 6044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 5196 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2472 3888 msedge.exe 71 PID 3888 wrote to memory of 2472 3888 msedge.exe 71 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3340 3888 msedge.exe 86 PID 3888 wrote to memory of 3984 3888 msedge.exe 88 PID 3888 wrote to memory of 3984 3888 msedge.exe 88 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87 PID 3888 wrote to memory of 2480 3888 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.co/LZiOmLaGxV1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffdd9b246f8,0x7ffdd9b24708,0x7ffdd9b247182⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15893427561163487095,8654968469663563694,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1476
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5f78c6c73f6db85b5c769a75145139fde
SHA137aacc656d0b6f454cb259071f3253c3d4a9b7a4
SHA2564cd94c086eb0a3a1bb123cd7be8ef271d3ba515fe53923f50bb3953dc47bbeb2
SHA512024f1844ac5d937f99813272e430e122802aa77152c1a279b4036d02ec44c37ce43c9436584456367c5c88b11dc1e4e9467e7f33347d0a5d2a2c6fd8438650c9
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
649B
MD57b65ceb92a3f1c602f1990304e24b0bb
SHA157b2b5d0f17f1d10dd01566c3e88bcf4c42e81b4
SHA256271f3140938312d32fa03ff2fc935f9b47defbe3ed009f2dfffa6116bae21530
SHA51295d451adf1ef91465a5f322c11ba5695fbd400689dd2473b68f0f811b7bd000711ea2b71772d89ca423d4dcf089a8342ffab176a97b927df8f1a38561a570713
-
Filesize
5KB
MD51b48515c83e268d55ec08d5de804e7ab
SHA1e92b94499b34481a8ec36e2ad84d25048325ddae
SHA2566cb5957d44c256567f0106310403f463361d81ac8fe7d1a50f3b78a6811a4764
SHA512d918898ec3c6f61d8ac8140745196da12d215fd830999e42a4feb000778346de776d88947a427628a942fb126c0a2b2e0cb95555969e2e90aa0efd796d109fcb
-
Filesize
6KB
MD5a788b3abe6d6f8eb3c0e2d7604aa2e53
SHA1a9111a644ba548e46c8362ae972ff24facbeb260
SHA256b0f49d5d8224a858910549ce2be9edaf9dd8dae09bc02fc984620cba61dcba7e
SHA5125b54680363e9b34072a67739525e29278333541d85a03cde0628c469c7599b09d27db8b1db3eca264edf16dd5f1b6278a07df43838b29e81eff809647a75c11e
-
Filesize
5KB
MD545a9588b1c89f0d72b9f9480ec6490e9
SHA1c98d5768b2f026fb94e3c8050d61bbde69f407c1
SHA25685d4dc5f6a622804ade9a75f2bfe8be91652692231a0c934784bc2b0537b08bf
SHA5121cacc09b802f5d7368e6a533ee0bd27bb7dc1d2c08c281d3fead5f9c3bc977fe494eebc54b941dfdf6555a90bb4543888b05474bc1e21b039ca42204fd0eaaf9
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
707B
MD5248bb50302a3ed0bb716dc5e195138dc
SHA13b365e58faad2bdc96adaa311c07d05bb4d60b00
SHA256acff16a6a375531a03c0c8bd24232de4a52b88df60f420cd509abab8a7ea6c0c
SHA5125e54ca29640025d12c6848ae974728a9bf3fac5064e29a5aeb43062d87193226f89e6067d3091bb06f52b6904a0f2b940975bb14a1134410c77d0308c41134b1
-
Filesize
540B
MD52c5b1e0e553f248baa047cbea95b1b68
SHA10d60ca42cebbb8c3895f02f3d395907896edcbf0
SHA2568a9f7ceaae749b0ff296997908c5d5e657c6637b7e516fa93b9b2f65904739d9
SHA5126382a49536128627520a430c31aace4277291be7ae80c67f9ba7149d99cc149075236fc6f846bf3c1845d781f16c083b7cb6004209379a56cb88546cb187b138
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cedc752bcbc7b2a9b1f8d2e1e5be3e7d
SHA14b233cefe4ab52498f14191b692bf139be5b795d
SHA256ff00f7b4aeb6e0b371658e6864278ef82ebdcc86866b30b584e430e8b28252cd
SHA51219afc44a41ea900e020ac4692df0110642b2a98aa46f73fbb231337a5d91d39ada9b581e2dda57eab8f553f6ba45d25517134530287051ea6d7daab474a04873