Analysis
-
max time kernel
20s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 16:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vxtwitter.com/DeadbyDaylight/status/1759971394916376662?s=20
Resource
win10v2004-20231215-en
General
-
Target
https://vxtwitter.com/DeadbyDaylight/status/1759971394916376662?s=20
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 968 1352 msedge.exe 42 PID 1352 wrote to memory of 968 1352 msedge.exe 42 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 336 1352 msedge.exe 85 PID 1352 wrote to memory of 4572 1352 msedge.exe 84 PID 1352 wrote to memory of 4572 1352 msedge.exe 84 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86 PID 1352 wrote to memory of 4460 1352 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://vxtwitter.com/DeadbyDaylight/status/1759971394916376662?s=201⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5a4846f8,0x7ffc5a484708,0x7ffc5a4847182⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7282659855889645536,16188613844286270383,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7282659855889645536,16188613844286270383,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7282659855889645536,16188613844286270383,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7282659855889645536,16188613844286270383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7282659855889645536,16188613844286270383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7282659855889645536,16188613844286270383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7282659855889645536,16188613844286270383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:2408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD557b9f8ac5cfd15d59abd15ef592fa44e
SHA15fd7fa1eee31e880783b2cc36d1ca1e9561522c5
SHA2568e4b3b4c5e3501d35e3d13f43cf538fb56204b5867776aab1767c9eab9ea2e6b
SHA512ba2518f6a9412872d3a7ec8eb1724e471fce3ff80f9ba0e77462f760c1b88d06f7eea6a4bfade4e39df632cf339b4c893ea3822c2e8c4631be2b90a9bcf9e680
-
Filesize
5KB
MD5146d31f62bbad75768230b606d547ebc
SHA125c0c87f8ada1895dd25379aebfe542aa7d39c31
SHA256671ac4ebd58520b8acd7037300441fe1bc15292cea9e5012ae7644dedeb28497
SHA5121de715f1338439fb5ec852446abc87e001e2dc4b3f1b103ae5d397f8d47f354ee9c23d5f7d9993fabd5877e82a75c08575807889938379c23aeacda6ac4898ad
-
Filesize
24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
10KB
MD5b4cfac3a7ef369f3df0c1e867aa2ed24
SHA1660cad6aa53051c814deddcea7643ae8739da1a9
SHA2568be87774ae88dd0a1d725fe60b7a0b0ace881b8f6bbdc77ffc1d765b9c888133
SHA5124e97a6dc856145724cc5014c3f82287e00d274975c29c4383546868de96edc71848c6c60a652c1db8e75d4abe99788350cd9674426a21228bd6974084255a2fe