Resubmissions
11/12/2023, 21:14
231211-z3m5aaagh3 111/12/2023, 21:11
231211-z1tjaahebl 111/12/2023, 21:08
231211-zyvzbshdgj 1Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 21:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamcommunity.com/gift/26482976473796
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
http://steamcommunity.com/gift/26482976473796
Resource
win10v2004-20231127-en
General
-
Target
http://steamcommunity.com/gift/26482976473796
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 5112 msedge.exe 5112 msedge.exe 4456 identity_helper.exe 4456 identity_helper.exe 5736 msedge.exe 5736 msedge.exe 5736 msedge.exe 5736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 5760 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3804 5112 msedge.exe 34 PID 5112 wrote to memory of 3804 5112 msedge.exe 34 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 4976 5112 msedge.exe 88 PID 5112 wrote to memory of 1340 5112 msedge.exe 87 PID 5112 wrote to memory of 1340 5112 msedge.exe 87 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89 PID 5112 wrote to memory of 4424 5112 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://steamcommunity.com/gift/264829764737961⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6e2646f8,0x7ffe6e264708,0x7ffe6e2647182⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3340
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a556bb6f129e6bd2dcfb5e29b7483f3c
SHA154f04d95d772d4837334739544f6871c10f24110
SHA256c88e30f34c1dd579de34700a10a25c92e55f09b47be34ef7742a01aea47f222c
SHA512405908519a2b51c42c380ebb160557fb551bbec0c015c7a6fa61acc01eaa32a6ae20895aeaa1879a4aea3b0cc6ec1754d30610a3e343105a0ea4350156a6fb2d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\27f01af8-67db-4ada-b8de-f900dd55d182.tmp
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD52812703ad8b6b0fe7f4d6dbb94448d04
SHA17899969f63ccb64584641cc676885ea8481df71d
SHA25607989f4b79c3ee3014c6cf1237f6707e125ed6390a0f07854edf0dbdb271b5f2
SHA512091388204d8d09eaadaa104d07f6ed9a530e5053a31c4efbae7f326c3a11c8778e457b74261390ea4b757952a88ab940184ff066c49e4b34b1abf3f32045be1c
-
Filesize
577B
MD51f6d35c61e6b26e7d26feed9519be7f7
SHA193845cdf7c456ab07b67f6506000c30d234a786d
SHA256ee8e8ef39233b4894d7c7752d11b77660e39713f4637406c14bf3b90286d50a6
SHA512fd51d5e5697fc77aa9919ef4c2f656a0a4316e4aa1b825b8ab70d701b64d6d8bb4ebcfbcd695e11b86245888fbe27d79009b3b84636c0183375283ccf6755c37
-
Filesize
5KB
MD566bd3fbc4f054644b425fb67e9453960
SHA189d7a4bc8aefb3ffd995e89d465d250ee7840338
SHA25608cfe9057510476a64798c4fb3e30d24a28e9e1096f51ceb61c5be696f431441
SHA51250030b5fd091784eaa29974893e357c3f8bcfdfca9037b21d2b15a1c6b62fb8466fef9ddbf7dc787377d838cfc506473b16565e0551aad801615193545045cca
-
Filesize
5KB
MD5eb04ff64102bc6e8af98ae3b4e3259c7
SHA10def43f454d61b5dc122c203cdbe219ee5359ce9
SHA256774575e4ede5dbd77796462d54342a90f037c4967676d0650b86f1232f881f3d
SHA51221ab816ff997603e0b1ddf7cea8d745ac0c8292802ee07fc2829126de759eb88410c218aa681486fa171899d178bc10a81852e82da96ff705413aea1f2e94456
-
Filesize
24KB
MD5aa3db81e5ed16930c40f0a83dd947008
SHA1594657b7812f4eb6b515b885f6004c366f38d1cf
SHA256becaf8dcc2fd6c3fade9787edc3848cc901fd0690a4b9e1dd29ca24e1449bd71
SHA512faef7417672e0919285c95e480226b82d7272a5057ed8342557bd995631d5332f497b82ffd1f5577d37e8972ef4b30c6441974b2197df1dc19bb1a4cf907e4c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD571f36760d1046a092f23fcebc93d53d1
SHA1bfe6abe940d1e1dcc35e713414a4077f31f61520
SHA2569080f4c0da2f5dc2e0044a46c9898bc092d53186aad1ed3e3b6069980515961f
SHA51287a494c93ba1e446a8d7cc6504f8c449f2a045cb02bf825ba657cf4d83f3f7a0930122d2bc317347725ffd586681408bd91d680b9744eb438bf8ef5b9e311e6a