Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2023 15:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://y79mvyq3j2y5-1322632174.cos.ap-singapore.myqcloud.com/y79mvyq3j2y5.html
Resource
win10v2004-20231127-en
General
-
Target
https://y79mvyq3j2y5-1322632174.cos.ap-singapore.myqcloud.com/y79mvyq3j2y5.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 568 msedge.exe 568 msedge.exe 1348 msedge.exe 1348 msedge.exe 3852 identity_helper.exe 3852 identity_helper.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1348 wrote to memory of 3600 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 3600 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 448 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 568 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 568 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe PID 1348 wrote to memory of 1844 1348 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://y79mvyq3j2y5-1322632174.cos.ap-singapore.myqcloud.com/y79mvyq3j2y5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9749246f8,0x7ff974924708,0x7ff9749247182⤵PID:3600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2496
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:4184
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:3448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:2104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,1979788264759649598,10875607393716613935,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4424 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c89e9212e22e92acc3d335fe9a44fe6
SHA1c43c7e1b5fb58a40a01a6d8dd947c41a48e0b41f
SHA25618c46c863404b31fcce434662806fa34daff0f9af0a9379d898f772b5c398b44
SHA512c6961c171af63ddc7a72aaba4c9d910cc6a424794c416cd1ce51206f7c7f1100ca51c9e41d07d68489105dccded2294c1d761a8dc6be80d22c661014efd6a9ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5d729479cb68a7196c3c393e4473a7635
SHA189851f3c74274fa8ec06a5aea411786bcdb24683
SHA256831dd54ee06d703192acf4689520c80a06a68e66b46fdb3ace769858e1b1f131
SHA5122be86c7436caa6bd990670e3a4320310eac056763c3ef75de8e9d69c38d5258eed425559e0205773afebf3b538854ebf3ca6b142cfc539f36cb0d2f5efe9ab82
-
Filesize
968B
MD5abcc8fd428111f327f71167e18f2dc19
SHA13cbfba5777dfd978104dc654c5f70c8939f9788e
SHA256b1cb3edd610ca11a8f73cef7440d349b951e26a5bc8f13d4d7bab6c493729be0
SHA512dd3cc1e26fd656ae2c8443afe3eb4bca38c749a30737ec261908ebceb46a09372ed0da79deefc0bc182a430e6efbc136a54ba16112ac88aa8fec3224c0e34dc5
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5046a4c0f1c22fa53eccffbe18fce0886
SHA1091ed0408ce4edef6a31587ea1930377df55a463
SHA2565df6213dec94fdebcc33f85877b64ec775fc2859714fa0b6da1e48ab600e8c7e
SHA512caed47ffdfaf60cb3804fe02b9b1e56ed02164fed0995eff69e035ed3c00bed8ffb930f0d556d1a9c6eecd9448df5f4a03789d8a6afa5667c39c98e4a906987f
-
Filesize
5KB
MD56c03d027e9bd0589bb06c8754edf0104
SHA127077d21c80973579a27d089de80a6d9c8ac656c
SHA256f033de5479a0242345cc65a6b939c29c7be644d7ccb09994abd53b37fd4314a2
SHA512a5fe4eb4418d8181a0dae8c080b8e79cd349420c05c1eea600fe7f7c94d1200dee9a8f5895a2e4f38930e11834c4ef6d1aad05e9ea284fc803568f11bb02185c
-
Filesize
24KB
MD5d7b2b29ef1d9a33e61e1167984c8ca3e
SHA19a0da1a3cf9003ecf6aba220a8a00ca34a7ebd34
SHA2567d4bbec0e8bf4e62f352750240a0bc0f7844d58fea590bc6a9fc972c3b752dc2
SHA5123cc40b7e35c0749e419b035a73768c8f76bace77ed44be6a59469a032b643da15162733e5aaa94064494b055858a24e4f79326a863f31f1c28eab44cec35cbec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bd3bbb98e649801fb30269f1c3550e47
SHA11dc53b8017e3c475308b8cf0a7a773b924b9efde
SHA2564809d5aea2fd5401d4937f3813fa87f43e8f0d3d5c21d5cff16d727e3b7aa5e2
SHA51284982c5ab6cd4df35abaa9b3337bdbcbc6fb95ad88d2b207cdb6b088caa1e833f1f263a7c5103892d167817a6a2a97b8cd4cec27309bdee358ff73b8d5a4ce42
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e