Resubmissions

11/12/2023, 21:14

231211-z3m5aaagh3 1

11/12/2023, 21:11

231211-z1tjaahebl 1

11/12/2023, 21:08

231211-zyvzbshdgj 1

Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 21:08

General

  • Target

    http://steamcommunity.com/gift/26482976473796

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://steamcommunity.com/gift/26482976473796
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6e2646f8,0x7ffe6e264708,0x7ffe6e264718
      2⤵
        PID:3804
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1340
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:2
        2⤵
          PID:4976
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
          2⤵
            PID:4424
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
            2⤵
              PID:4396
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:1
              2⤵
                PID:2016
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:1
                2⤵
                  PID:4372
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:8
                  2⤵
                    PID:4044
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4456
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                    2⤵
                      PID:4256
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
                      2⤵
                        PID:4724
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                        2⤵
                          PID:5328
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:1
                          2⤵
                            PID:5336
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5544701592060879502,14797196140988035133,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5736
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1532
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3340
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
                              1⤵
                                PID:5728
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5760

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                a556bb6f129e6bd2dcfb5e29b7483f3c

                                SHA1

                                54f04d95d772d4837334739544f6871c10f24110

                                SHA256

                                c88e30f34c1dd579de34700a10a25c92e55f09b47be34ef7742a01aea47f222c

                                SHA512

                                405908519a2b51c42c380ebb160557fb551bbec0c015c7a6fa61acc01eaa32a6ae20895aeaa1879a4aea3b0cc6ec1754d30610a3e343105a0ea4350156a6fb2d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\27f01af8-67db-4ada-b8de-f900dd55d182.tmp

                                Filesize

                                111B

                                MD5

                                285252a2f6327d41eab203dc2f402c67

                                SHA1

                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                SHA256

                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                SHA512

                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                672B

                                MD5

                                2812703ad8b6b0fe7f4d6dbb94448d04

                                SHA1

                                7899969f63ccb64584641cc676885ea8481df71d

                                SHA256

                                07989f4b79c3ee3014c6cf1237f6707e125ed6390a0f07854edf0dbdb271b5f2

                                SHA512

                                091388204d8d09eaadaa104d07f6ed9a530e5053a31c4efbae7f326c3a11c8778e457b74261390ea4b757952a88ab940184ff066c49e4b34b1abf3f32045be1c

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                577B

                                MD5

                                1f6d35c61e6b26e7d26feed9519be7f7

                                SHA1

                                93845cdf7c456ab07b67f6506000c30d234a786d

                                SHA256

                                ee8e8ef39233b4894d7c7752d11b77660e39713f4637406c14bf3b90286d50a6

                                SHA512

                                fd51d5e5697fc77aa9919ef4c2f656a0a4316e4aa1b825b8ab70d701b64d6d8bb4ebcfbcd695e11b86245888fbe27d79009b3b84636c0183375283ccf6755c37

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                66bd3fbc4f054644b425fb67e9453960

                                SHA1

                                89d7a4bc8aefb3ffd995e89d465d250ee7840338

                                SHA256

                                08cfe9057510476a64798c4fb3e30d24a28e9e1096f51ceb61c5be696f431441

                                SHA512

                                50030b5fd091784eaa29974893e357c3f8bcfdfca9037b21d2b15a1c6b62fb8466fef9ddbf7dc787377d838cfc506473b16565e0551aad801615193545045cca

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                eb04ff64102bc6e8af98ae3b4e3259c7

                                SHA1

                                0def43f454d61b5dc122c203cdbe219ee5359ce9

                                SHA256

                                774575e4ede5dbd77796462d54342a90f037c4967676d0650b86f1232f881f3d

                                SHA512

                                21ab816ff997603e0b1ddf7cea8d745ac0c8292802ee07fc2829126de759eb88410c218aa681486fa171899d178bc10a81852e82da96ff705413aea1f2e94456

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                Filesize

                                24KB

                                MD5

                                aa3db81e5ed16930c40f0a83dd947008

                                SHA1

                                594657b7812f4eb6b515b885f6004c366f38d1cf

                                SHA256

                                becaf8dcc2fd6c3fade9787edc3848cc901fd0690a4b9e1dd29ca24e1449bd71

                                SHA512

                                faef7417672e0919285c95e480226b82d7272a5057ed8342557bd995631d5332f497b82ffd1f5577d37e8972ef4b30c6441974b2197df1dc19bb1a4cf907e4c2

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                71f36760d1046a092f23fcebc93d53d1

                                SHA1

                                bfe6abe940d1e1dcc35e713414a4077f31f61520

                                SHA256

                                9080f4c0da2f5dc2e0044a46c9898bc092d53186aad1ed3e3b6069980515961f

                                SHA512

                                87a494c93ba1e446a8d7cc6504f8c449f2a045cb02bf825ba657cf4d83f3f7a0930122d2bc317347725ffd586681408bd91d680b9744eb438bf8ef5b9e311e6a

                              • memory/5760-299-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-304-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-295-0x0000018E26630000-0x0000018E26631000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-296-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-297-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-298-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-263-0x0000018E1DF40000-0x0000018E1DF50000-memory.dmp

                                Filesize

                                64KB

                              • memory/5760-300-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-301-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-302-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-303-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-279-0x0000018E1E040000-0x0000018E1E050000-memory.dmp

                                Filesize

                                64KB

                              • memory/5760-305-0x0000018E26660000-0x0000018E26661000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-306-0x0000018E26280000-0x0000018E26281000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-307-0x0000018E26270000-0x0000018E26271000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-309-0x0000018E26280000-0x0000018E26281000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-312-0x0000018E26270000-0x0000018E26271000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-315-0x0000018E261B0000-0x0000018E261B1000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-327-0x0000018E263B0000-0x0000018E263B1000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-329-0x0000018E263C0000-0x0000018E263C1000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-330-0x0000018E263C0000-0x0000018E263C1000-memory.dmp

                                Filesize

                                4KB

                              • memory/5760-331-0x0000018E264D0000-0x0000018E264D1000-memory.dmp

                                Filesize

                                4KB