Analysis
-
max time kernel
88s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 13:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tinyurl.com/yqq2sspa#pFz5MM
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://tinyurl.com/yqq2sspa#pFz5MM
Resource
win10v2004-20231222-en
General
-
Target
https://tinyurl.com/yqq2sspa#pFz5MM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 1032 msedge.exe 1032 msedge.exe 3452 identity_helper.exe 3452 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1840 1032 msedge.exe 87 PID 1032 wrote to memory of 1840 1032 msedge.exe 87 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 4788 1032 msedge.exe 90 PID 1032 wrote to memory of 2500 1032 msedge.exe 89 PID 1032 wrote to memory of 2500 1032 msedge.exe 89 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88 PID 1032 wrote to memory of 3196 1032 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://tinyurl.com/yqq2sspa#pFz5MM1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc270446f8,0x7ffc27044708,0x7ffc270447182⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2864 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4256200123084149013,4066378113563900318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:2520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
537B
MD5e168920553d612de1ecf427fd7ff14e1
SHA173b7eab8695a8dd885e26c5bdfac213b39c3cf3f
SHA2560fdefe5ac016c872b4d9e0cd67a5ab24f41c070e06fb6ba18352ef0374e82ed2
SHA5123ebd1b952a6d08487f146416a505e2d5c71325d614456d8fe41790c969d12420747209588af28ffe841803d23fb0e00ff79708f7e771d94936e742acbde005e9
-
Filesize
8KB
MD5564abea2ea9c4755885a4f39f3fe1398
SHA150504422da0990d9e6b4d5be45aa182ed86470d5
SHA2568f3c8e94d3159a91aa552223f749eb6d46396643512dc6997ed74e5444fcc5eb
SHA5124983ef6c3012be305c7b0238cd2331b97eac29f8c2d630fc9e8ccfe06d8f97e3faff0b6a83c38d89070262c02d73e3f5604bee8ce691af4a044eec729684c105
-
Filesize
9KB
MD5b6bf8eec9ef96280f1e88c090326179c
SHA123ef314044008f843beccb62c5aaaec9586e1383
SHA25626e32efbafbfd425d9bd3c720e55b9e1ce6148a58ccb3ae96bb8f72d72760460
SHA512d6026ce62d5af0a4c2690a14d6624b93e2988fc92fdc0ea50a6a8707311eab863c6a7d1efcca7aa8004b5bd0ba54a9dd0c516c7c44cf05674aee690e8308d958
-
Filesize
5KB
MD5e629805caac0cea9e43a27222c1c1fd8
SHA11d8fd995ae20d53843c2444d52f288741f619ee0
SHA25655c7be47487a941a6af1e0deea5253524317d8293a32c2304588864210a7d959
SHA51241d2c7cf09525030a6b813694f57ef2155fe799780a8fc50edb139d5159cf277d4e53e396355e320585225ec4aff86621cfedc8f2820271477ca8380fd0b51df
-
Filesize
5KB
MD5a90ba7bc8a0b4a9537b4f06d7b8de944
SHA1a136ee48610e399b68a8aef6cf69f63e098b82fa
SHA2562e438eee8979fbaf381890350a85b08560ec85002bb87f5348ef990de578f460
SHA512347e4688e0440930b045718e3893c61d25c65a3eb14efae8462da36fd48ffab4e375c58bdf3d8302ae3bf714f72f4c82669cbb5e022e2ca4e49dd58de351820f
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58049e8e825df1e6ad089e03844690984
SHA13642c7b6b903fc02381ba8c6e7a53d1e5ecb562e
SHA256849899cad62767ec7a109409971905878f68d1c68f593ecfabed4384617ce158
SHA512ec1ba8bca8c5310d74a6ee13bd9e46bdae3cb1181a84758d9b63744c4c70deab2b193784edc1d2f43eb290cf7b0ba864b83dc5af08803ddcb0b80ddbd3e0ba21
-
Filesize
10KB
MD5906d57ff677e527b3ae966882220bbd2
SHA190635ff32894fa8f3b1778bfa97bd8dfeaecf180
SHA25628289a07c7c246abb6f121491fab7f11d8adedaa79428d3347a3b6af0798e2f9
SHA5129fc47a19d464cea078eca00352be8eae6aa446a23abebad16d7099c7315be555ba8e43343552b4fcb68cec10667fe074ec2f717eeee96c87d3da0c46c89e371d