Resubmissions
01/11/2023, 01:14
231101-bl3xeaae43 5Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 01:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://claim-myreturn.top
Resource
win10v2004-20231023-en
Behavioral task
behavioral2
Sample
https://claim-myreturn.top
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral3
Sample
https://claim-myreturn.top
Resource
android-x64-20231023.1-en
Behavioral task
behavioral4
Sample
https://claim-myreturn.top
Resource
android-x64-arm64-20231023-en
General
-
Target
https://claim-myreturn.top
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 860 msedge.exe 860 msedge.exe 3544 msedge.exe 3544 msedge.exe 3952 identity_helper.exe 3952 identity_helper.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious use of FindShellTrayWindow 45 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious use of SendNotifyMessage 44 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2512 3544 msedge.exe 48 PID 3544 wrote to memory of 2512 3544 msedge.exe 48 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 4740 3544 msedge.exe 85 PID 3544 wrote to memory of 860 3544 msedge.exe 86 PID 3544 wrote to memory of 860 3544 msedge.exe 86 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87 PID 3544 wrote to memory of 3036 3544 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://claim-myreturn.top1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8f9346f8,0x7ffb8f934708,0x7ffb8f9347182⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2536 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14833189465339250851,17371723267289332488,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5560 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52ea3601c8a9465b5a442126c538e04b0
SHA14ccc7b610463827cc72e269d339d51e0dcb10a39
SHA2567d4a1ea34b9df8502ff5b523c476cf5839e0e797bb78987e5aa62bdd0743f64a
SHA512c1ebe7c7495cf7babfd1d0007f1cf1cfb5f4a55e0406594ed5148ce1ac50cd74c289cbb1707d39bf4dcace8b09ebad76e793d190909c9cd10f6532ba4a9dead9
-
Filesize
476B
MD5507beaa948241688ce9517f8e4a8c88a
SHA16e1fefd0a24e98880319d5ad0adec34eec911dda
SHA2565371c174fe00e6611f9442ee824210dc0ac57cbe7d02fd1b36f8c549ba61758e
SHA512d25c45a9fde74d759b20f59c2b47e90337ca40017892532bc9ff13ceeadf122ef917623e8319dec21d62fbc798e3de542612af2da1bfeb22b34deec9c4729fc0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD50d8e39919f38ba7423cbc41be4b3d0b7
SHA167c6bb8848ff2ead0b8c001ada19a11db28c7e6d
SHA2564f61455223a7e1bcb72418d34e5a868c1ed1766357f3e1b20e6942e661d7d0ab
SHA512b6f15079262cde17f6a8a6263fa063ee09b515dda5ddfbb931d7c2060e8e84378ab3200bf82a49208c63eb0e31fc61bd0e481cee21ba8b080e0a462be595baba
-
Filesize
6KB
MD54ada59632e9028114e058b6afbb377be
SHA1037fb842de1e49e182a8705ac3aad04c2caaad39
SHA256bcfbaa19bd282a8cda212a1a14cf7143623c41e85cec3d0b7d61b02c90d58f7f
SHA512570a54359625eb133bd713a44197e29856715badb698680be631262190c6d3959eb141314b4bead3bd60697de90d9b35fefca0dba95bb925c0285aeb746bb562
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e6e770a5-1570-4458-86ee-213ec8fe7ef9.tmp
Filesize5KB
MD59eb94f77058d4bc0b29a7bffaef6bc86
SHA11f3415cd249c53065b7c6498a32c0b7acfca5c8c
SHA256bb8ecc9bcd3f4b297a115e7a03dc98c2f241a54696a298c990352932b9b9cf8e
SHA51298d17bd0fb93b63f92c6c5e4d5a22a29cc2c585905b8cac271d2ce9bd4cb6c8b187e78ec0f4c1cdbd6c58d6b6923bbb02aff803f7eb8a149d9c583ef4a8bd051
-
Filesize
10KB
MD53e731fe1ead49d090ac83a08c668ca95
SHA1b12df8b8e9bee37d2c8a974a4165fa5ff557e5a5
SHA25632488753c1df355de2b8083c8b958e491a4cc411cd6d415ae325cc387c64b369
SHA51280f88f6614db18c75d1b0eb369bb905747172e8ff93c99b0902b1de99200514244895bdc4abb232f20606390ccea9d07fc9520e0403a9a0af289679f4b6eac82
-
Filesize
12KB
MD5c2f80fd84a8e64b77ace7c09ff8290bb
SHA10575bbed5428b00ee9cdfafb876916d0de5fd113
SHA2562e60decab509abca057990e5ddd757a0da6c702c0c1eb026a62a33f797369f06
SHA5125f0a11e88c65b43b04ac287d161a15b3e0762f2795b8a379fb6e6ec4a226e8b2ec1afc5e2c88b580b4913e294d76f5ec7d1b170921a50d46d58c828665caff86