Analysis
-
max time kernel
1681s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 18:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://streamifynow.fun/en/movie/940721/?godzila-minus-one
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://streamifynow.fun/en/movie/940721/?godzila-minus-one
Resource
win10v2004-20231215-en
General
-
Target
https://streamifynow.fun/en/movie/940721/?godzila-minus-one
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 2380 msedge.exe 2380 msedge.exe 1788 identity_helper.exe 1788 identity_helper.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1920 2380 msedge.exe 84 PID 2380 wrote to memory of 1920 2380 msedge.exe 84 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 4356 2380 msedge.exe 85 PID 2380 wrote to memory of 3400 2380 msedge.exe 86 PID 2380 wrote to memory of 3400 2380 msedge.exe 86 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87 PID 2380 wrote to memory of 3520 2380 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://streamifynow.fun/en/movie/940721/?godzila-minus-one1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaae7746f8,0x7ffaae774708,0x7ffaae7747182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2632 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,8749824285812717220,8378859013953868875,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5d74b4f28f3648d681fb4a7b788037f35
SHA131a35725c8ee0e337ec831a5e2540f01e888bde7
SHA256745430208c1485cfbb66b98f3fa03e45779f702cb531a2d4894b9b513b0bc36a
SHA5129d2628a2b6cc095d4b4c84f13fe9412a3442fa80de3ed207c9d504f073876fcd3ba6bfc22aee793f0fc82ae7f5ab31f9844a8348b4c96df72476b1798cdca92e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5c65e34a8e963e9cf5647d91f11125486
SHA17176c28ec5c3beaac1ae23a5d0585ae126af526a
SHA256cf54a518fbfbee21e508200df3bcff1805ce786c8f4a3434b304ddd674401e8d
SHA5123f6b13249ca7825f705191515f6499d4230a2cd923fbb7fa123e889172a911414334b7e09da0637a38a7fe392023ea8f82a69065148f0337b0486448561ac6a9
-
Filesize
6KB
MD5a1c441a06001cec2159ac76f5dce0fd0
SHA1503882927e5a5ef8f752e60e34239b87b44de369
SHA25644d328596292e66423ee1512bad09c879875ecbe23393c9549ca43140159ce4b
SHA5123b30fd2e680f87dee0b3b3987d920977a6e4b14afb107d8adb45f7d7c03fc5e710c9c3befc7674b56b03a01332cdc60e529bc5ee6c918ae3235decafc7ad45cf
-
Filesize
5KB
MD595ed61b57cb0bfd84e994c45a270117f
SHA1322a931cab7d7682346054cc2ba4dbe94bb6d06c
SHA25648f234153492d2886b616c67ac3533e9ff402a839fd8b9de950e087980c29d0a
SHA512e96013b5b4e7a1f4a06856535685c3a8f4e25dd60583fb0bef06b4dadc17ede53224e9ef21bf7a4dd8d7ae3080168b7ab3bae6d2ef8e5ad26931e9a8aadf6e71
-
Filesize
24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a9144cb2e9fdece36a0cfb5043118874
SHA1ff6b344dea21429a369708eb6535f971d99f0f61
SHA25621bc51d4cc78686d7332551a55312cbd65f1e78aeb04e8ed21a5206e17940660
SHA512cde5e14d56b9d8b6e93416af77a7b30217c321e46ef6583805e17fa0076b84bf723ef8dd5f0e7ea03ea111f4961f7f98a2f8676da5260265331f043be5784cfa