Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 10:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://strava.app.link
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://strava.app.link
Resource
win10v2004-20231215-en
General
-
Target
http://strava.app.link
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 552 msedge.exe 552 msedge.exe 2840 identity_helper.exe 2840 identity_helper.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 4028 552 msedge.exe 86 PID 552 wrote to memory of 4028 552 msedge.exe 86 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 856 552 msedge.exe 89 PID 552 wrote to memory of 1616 552 msedge.exe 88 PID 552 wrote to memory of 1616 552 msedge.exe 88 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87 PID 552 wrote to memory of 2068 552 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://strava.app.link1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed3a446f8,0x7ffed3a44708,0x7ffed3a447182⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12599108861313616860,8696239515783425759,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2668 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\57fbf9ee-b67e-49fa-b86d-ef9adfdabfee.tmp
Filesize5KB
MD5e0893b504d2d2b8f310e9b04c59333af
SHA14522978b5cf2f34324e8e6354906a34010ecf244
SHA2569cb90dd683e000c620848da4ff4935d175ab2e38ab1ffb940d556e4bb2bc4df5
SHA5125f1ba2a92a1740597d62f565427e566775d5340835d2881e2afd9b08e506bf805a6b0b8bd0ed60371909153e2b2a845ca4ad4b37d182bf31785bacc8e53e9412
-
Filesize
201KB
MD5c445ab4315d0633d446998c80764cc36
SHA147d3dee9845cc6e29b6771dd6560793b8b93000e
SHA2565635695eeb70b51c449aea7a5bd3c9699c3c28c64498fb7fcb8173aad45d7242
SHA51283a32ffdddf3ee56e89f232c8d05a4b00265895b0e41d13700f90fa389f0bf3f112c291c24c3819751803322b11e2ff866971d835d601672b36818c4e099bff1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD56766970d9038b39690db3f5f0096e6f9
SHA10eeb086db89b56e580fd7e1946a38ced94a614f3
SHA2565396102c7f674593193f98ae58dd90012f56ffe3fd99b3f10405f938163e852d
SHA5126a641a6303fd55d4901e749e1d30b14231d227233034e434f14b5dd3b4cdc4770aa13f9c37fba3a6b7bfda4bc09d75b16f54e0ac656a46a65ab3e355fca0a823
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD529f0ffe5bb736988eba46a2b56351fd6
SHA10b46158dbd50f24088b7faf3ff0161b2e499c330
SHA256da2dd1533db22bf80c6202597290a23574947bfead14f90b894de4a571f0d986
SHA512087cda0e86dc1d54a64d0e51888288ae4efd8c124da9c7f7b60bcaa7259fe34f2c3d0a184603ac9eef9765a1afb1e9fbf8d86715c00a36d00dc72e6b4066e4d2
-
Filesize
6KB
MD54aa447802d7dbe6943a8c194e75879bb
SHA15b9e5c61c476e95a11164c57c4f903c8b57967b5
SHA256078bd54b708ded069ccf6adcc1202a6b928c62c2fea733fb84c9a123d31c843a
SHA5122ff7df800773cb0bc33857981a017a56ae2e1728fcd4c2721addd073681cb7aa34e3995ab611b3d4cb600160cf53f9a5af3bfbe06e05e26a8aa04b876af11815
-
Filesize
6KB
MD5a294fbf2749e211fbe7a704f5d52ac94
SHA19fa2b557646862b888a59e7be539f5b443dd4d9f
SHA25684ddd3a109aad6a8b7e27b3b108c1f447680df84a1a78bb7f9d0a949da142e70
SHA5128d57c87fa5f32d5097f487da83ea1265f93830fe78a3bd3a91aa243ef9754ce9131a7c3e527ae3728a4ba104a9355779ed44c18c2a14861521b760f1d6af6b31
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD56122d1a062fe9a25586d19931a415ad6
SHA153a7c8ab788172fcd8bc42d40b02e11883bad214
SHA256a93de84b2b3d81bfee7c2e88f0c5d16830a6d02c250a0a015b94d3b00b44c946
SHA512addcdb9a5efeea2fcc04fa26ffed681f7019ec52c0c2ee1c4a7a96317cf738f6aa2074bb5ec0adb3d1ad4d310395654dfa8b8a98e468b4a78bb1adafc78fadef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a6bf.TMP
Filesize48B
MD50bb6c127f9e15a2d008b3e162399d44a
SHA1b3e927ef02e4fec03a8ab6995bfa7d52a7834e68
SHA256335f2b79ee22152b9922abcc6ce318e9e2ce69328486c30403e1b3749cbe0dde
SHA51218133fd58eb58943ec1825aee8d099cf6fe49bd0cd9e4938ecfe1f023499816439098b51863524ff5ef5075aaf90d8bbc9227d3f0efab217ce87727d51270086
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51cd859c96b3dbb7dec2be0884d48b35b
SHA190e0b22115459484dff59d5947b8dcd807d32492
SHA256155a18a17f5beb9594ea39e012b3371f1a1181c712a97b973961dac62cf89abd
SHA5123353f52e1ba448a408ac8d455cd0c088a164bf6a163b0487a20e39eafc3789cde40d6eb0e0dfa18652a64b29d346150058e2ebca135e1600d136174b67de7d4c