Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2024 13:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://video.g46y6.bio/gtl5EeuQ.eu
Resource
win10v2004-20231215-en
General
-
Target
https://video.g46y6.bio/gtl5EeuQ.eu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3140 msedge.exe 3140 msedge.exe 3552 msedge.exe 3552 msedge.exe 392 identity_helper.exe 392 identity_helper.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3552 wrote to memory of 4580 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4580 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 5036 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 3140 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 3140 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe PID 3552 wrote to memory of 4396 3552 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://video.g46y6.bio/gtl5EeuQ.eu1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c6c046f8,0x7ff8c6c04708,0x7ff8c6c047182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1909350620257275390,11248739814184289955,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\536f5387-f4a0-4e45-b871-254de8034feb.tmpFilesize
5KB
MD59d9a891786a7576d5ef957e3e86b19d7
SHA1d1efadab234b68bf124773fb87c62f55a0052426
SHA2562d032c9a276930a789e3b1d0a994c462df320b5ad463a6a8883471a650fb3f52
SHA5123e40ee93dc8f780ff54e7628352a06cb367491b7172faa82b0d74fbdb2a0d1cc99db6245d179be6c03f1257e5ff5ccd85af5e3768961749890a6b923e33f6e8c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
441B
MD524133c56d8217126f2b9f60e872b00cb
SHA12e88600162b5f6575ab4b6654d24dc68fd9198df
SHA256ae8c082cacaa47afeb0e5ee904b5e57cb4eb3adcdfb120ba56c5db455876b465
SHA5122481ac430791587ae5ed225cb7d402ff64455c6a45343d6927def47bc71526c15bcd67318141473211d35682627c4690f728e2c02402641e449ee34b1843b403
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD57f925bab97934d646977cf633910be1c
SHA1731cf4aa3301978e886408604743b8aac610e65e
SHA2567c4c6386b2781b3bafde3b55808cb6b7609051b44f59fbb00204f5e10014dfff
SHA512d7c2ad3aa3396349d496b42bd3998ceb66ce30a28a3034766cdf2f79293a8e14f0b37c57a59d2fb4572f9d852684ca61579346a92b460c823e350c80751812fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5ac8957535e5e04102d453ed9b6abc3de
SHA142df0b6982c1f28e4f98d27d1bfcb149dfa54e74
SHA256d31309aa4c8649c3fd482c55948ce44c8f6560ed73404c8606398d5986ab3a08
SHA5126a0210d8611da1b39c4968fb2c588630bfb0768906d149df06481705d89a0759c32145ed43c208ac29822db4529d5f41a484a96d75b38afc57114bbadee5b8c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD5101e075ad438d41d2bdecbfb7acaf423
SHA1e414663ff80b5759e516fc1f0b6517591fc242dc
SHA25671b2494a766ff424d5984d3f0819d7dc43a183e67e7e928f77769538acb2af62
SHA512eb6982ca6e6d244bc69ecc728a045876ee00e7008e8ec2aa8556a22b6da9c745003bfb0c6f82a96522453c2ab84d1864f1dbd912cb10d072dfaa9113cae416e0
-
\??\pipe\LOCAL\crashpad_3552_OFEIELYZFMDLASLXMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e