Analysis
-
max time kernel
1721s -
max time network
1788s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 08:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/joo3Rbqa#jUDqPjnRsaGTWbGlsvid5g2FsLsL8aKgESZWw5SXcn8
Resource
win10v2004-20231215-en
General
-
Target
https://mega.nz/file/joo3Rbqa#jUDqPjnRsaGTWbGlsvid5g2FsLsL8aKgESZWw5SXcn8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe 1232 msedge.exe 1232 msedge.exe 1380 identity_helper.exe 1380 identity_helper.exe 5804 msedge.exe 5804 msedge.exe 5804 msedge.exe 5804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 5712 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe 1232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2836 1232 msedge.exe 16 PID 1232 wrote to memory of 2836 1232 msedge.exe 16 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 388 1232 msedge.exe 30 PID 1232 wrote to memory of 2612 1232 msedge.exe 23 PID 1232 wrote to memory of 2612 1232 msedge.exe 23 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24 PID 1232 wrote to memory of 4468 1232 msedge.exe 24
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1a4a46f8,0x7ffa1a4a4708,0x7ffa1a4a47181⤵PID:2836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/joo3Rbqa#jUDqPjnRsaGTWbGlsvid5g2FsLsL8aKgESZWw5SXcn81⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,11255899743796208572,833054501522966640,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4288
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD51652bed28822c9d234b30628f1dd5bb8
SHA10b643ab205699e25e2a82a79eeaabe97611bbff9
SHA256ed3c41b4b4bb7cdb28755ff236dbeee045bd612f69ed208fdad0afd4cd6d91a6
SHA5128016b7844507f58d277230ce6853d49c6f0fe94741362dc5b41dbff360f160e3ac3839213b16f62490c4d8698add552ab880b7f141bc077ac47c8c4f6e9904b6
-
Filesize
152B
MD5eb20b5930f48aa090358398afb25b683
SHA14892c8b72aa16c5b3f1b72811bf32b89f2d13392
SHA2562695ab23c2b43aa257f44b6943b6a56b395ea77dc24e5a9bd16acc2578168a35
SHA512d0c6012a0059bc1bb49b2f293e6c07019153e0faf833961f646a85b992b47896092f33fdccc893334c79f452218d1542e339ded3f1b69bd8e343d232e6c3d9e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5c279de9034f2e1578c6f0477d8f3c91a
SHA174c7ca59ecc7ce751175c827270c97a443104e84
SHA256230852ada955d5353fa1d0ec06f7ff2ab5346ff2274f4b1ac7407bac919205f2
SHA5121dfcc6e2a496a1250207532127d34250eccc66430e149cb90bd06a06d530008598a0743655e3e9cc0a317cf1f37e054a8a531a2de936c8e129b57eafd503f6c1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
5KB
MD5c7abeba03102b05a76a792cf9d36789c
SHA17a1130a52522bc9b71ec7bdb5bb81629be8bf0e0
SHA256d296cab7514c77587ef961381c984bbf5af68e3fa591c8b5c7e74e005a944bd9
SHA512bf3f64678158cbbbce41723c8b873867b66cf35bbc333a62b3f1ac9f2f3211c6fb23cee06c6b873c997bd663f4c02205497ae385bcc0c1a3ab7d9133ea9e665a
-
Filesize
5KB
MD5b0f43c06923334d09fdadebf4409e126
SHA101077ea9d45c9bd9d05d1ec8fad0249197794921
SHA256170a7cde36513b3844bc908981dc24d4fdbfd464510dbff15ddb5e161e932277
SHA51240733d815366d1e4ad0b0c3628e75457972741867b7103bad08727f961d60410f2fddf465990bf59eeb749facb9411dba3a19c5b0446b73e35c6e82162c94806
-
Filesize
24KB
MD52bbbdb35220e81614659f8e50e6b8a44
SHA17729a18e075646fb77eb7319e30d346552a6c9de
SHA25673f853ad74a9ac44bc4edf5a6499d237c940c905d3d62ea617fbb58d5e92a8dd
SHA51259c5c7c0fbe53fa34299395db6e671acfc224dee54c7e1e00b1ce3c8e4dfb308bf2d170dfdbdda9ca32b4ad0281cde7bd6ae08ea87544ea5324bcb94a631f899
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53e548281b2638b7e48c84b18fafa3035
SHA167b5d749dc69aa76878ae6028402eed4234dae93
SHA25691caa817eeca05f19839d4cab76342c54a4fe9e5064d3e503a42018711c19244
SHA51237beefeee627826cd6a3d53f8bec6a5f4c574389dd9b7033d3dc62ce850f4253606ed20e74cfe6bb2f98ea0afced9fd8375175777c795c81cb8ff95cfddcd6fc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581940.TMP
Filesize48B
MD51c3752ad2a45f67326d9f010b349fac7
SHA1d9be109be63689f6945ed72a21549696ebca11be
SHA25620178a9cf5516b455ab36cb5bfba8c3052dc5c7ada8d46e64aeb3ee4971f43f3
SHA512054d45fb7baa42bf8bb502e4f4d8da6bf87e82d0d13a97896016665a85c99a054c68367dfc46e87a802bf9114e74127e7b2467942c4e994cb6d516863baf777c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f45e5f22cfc813962449f66042ef6460
SHA11554f8ebd6f1e197ae2523959cac540b32b58189
SHA2563145c0ad02eadec0d1fd7eb778d86db2fbb29c2ff3cc2afd1aa0b87a1b162c57
SHA512d1a77954cc6561917f36ab61fe054e4f1825775f0c3fff28e4370057b5990e77d75cfd184d20b6be36ba050be756976b4c1978006de7284ea5d572b799e9768e