Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 12:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/servers/the-genesis-project-207045717687009280
Resource
win10v2004-20231020-en
General
-
Target
https://discord.com/servers/the-genesis-project-207045717687009280
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4668 msedge.exe 4668 msedge.exe 3912 identity_helper.exe 3912 identity_helper.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe 5676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 2112 4668 msedge.exe 85 PID 4668 wrote to memory of 2112 4668 msedge.exe 85 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4132 4668 msedge.exe 86 PID 4668 wrote to memory of 4388 4668 msedge.exe 87 PID 4668 wrote to memory of 4388 4668 msedge.exe 87 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88 PID 4668 wrote to memory of 4976 4668 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/servers/the-genesis-project-2070457176870092801⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4c0246f8,0x7ffb4c024708,0x7ffb4c0247182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4544498311798044270,14346567580019618509,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5483924abaaa7ce1345acd8547cfe77f4
SHA14190d880b95d9506385087d6c2f5434f0e9f63e8
SHA2569a111c2b76c1b5f6d4f702502b9ff4326b7b5682921c2760286dd073824cb684
SHA512e4ac0a0d5f06e056901c68488e34358a32a5bc7aeffcd82af7eba6043d0fa35eaa67a67c3716dcb661aaca441677819bcba7d35bc4efc6103f3ce32f78e32310
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD52b7e7bbb504e863a2a10571f369fde74
SHA1d81ccbda5402ac2576d843642c2cd290110b1a19
SHA25683a4ae28198e618c49b2217d0055e6f230ffc5539f8b5effa617f1ed9ae93a86
SHA512651f768f7ebc3e1e0d7963b713a22b8e645159245fb280433da59b3211d7a56f9ddf0e5f93b48e621f8ce33794b3114052772fc4689084ab98c89446d73c6782
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
479B
MD52e8e59ec5b3ed5e816143b392bc98ab5
SHA1091cca026b9350209dbc74fb2ec076079e1f277f
SHA256f9c5cc47c0ba03ec36b7fb6ccfc481edab30888c5da729ea8258f59437471380
SHA5128c3e250f1ad5552d5419416a36e57ef5747fb3b7cb08f217568a8fd195e25f5e781f969f68dfac63a5d895605806630c22fe47a943ce8cac215d7c658b82d82a
-
Filesize
5KB
MD53903afb3a8eb0ec73826c6f400872776
SHA1d66419f4f2ba51e8d48ec0363ebe71b996ac7aeb
SHA256840073106415acf048f50d1ff7c1f54c86f810ee60ddf692a62f29440ed177bb
SHA512143dc170bcc7f8394e5c23045396cbfd34c098332129d54d41f07582be2df927af4e69f577a4985421554c01a2d451e4dde5f7e767a0616c29ac1994e65f8ac5
-
Filesize
5KB
MD5cbb95543c8ccbbc080d54c4b3ee31249
SHA1fe4c221144e731574b97986953b6d2fb5021f69f
SHA256501f8a7550c4aa17832a86599eea052638642882ab060208984ebc060fcdcbb4
SHA512a87a4479b16ad03020c35a5af9463e47fd726b0b1153114cec35b3a7fa67e775578397f87d245530b012912ebd620229d71f1ce4361bf720ecc05df627319ff4
-
Filesize
24KB
MD51c706d53e85fb5321a8396d197051531
SHA10d92aa8524fb1d47e7ee5d614e58a398c06141a4
SHA25680c44553381f37e930f1c82a1dc2e77acd7b955ec0dc99d090d5bd6b32c3c932
SHA512d43867392c553d4afffa45a1b87a74e819964011fb1226ee54e23a98fc63ca80e266730cec6796a2afa435b1ea28aed72c55eae1ae5d31ec778f53be3e2162fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD528ebb2c4a9f24556f5bb940d6673285d
SHA19c7cc5d4507176fb7bf16f70034e05840fd9b0c6
SHA256667d64c703413ddfc101c5d392c09ab6ed077153eefbe8e5283cafa72da080d1
SHA512b85c394f660d0f909197b7893e5701058d52822e2985d1d84b1be23a196dcb5b5bb2a63ae191b9349ad4d9478c27d973e3e4ccea35f16c37ce2ca36dda44fb31