Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-02-2024 20:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcommunijty.com/gift/6388299377
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
https://steamcommunijty.com/gift/6388299377
Resource
win11-20240214-en
General
-
Target
https://steamcommunijty.com/gift/6388299377
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4876 msedge.exe 4876 msedge.exe 2292 msedge.exe 2292 msedge.exe 1220 identity_helper.exe 1220 identity_helper.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1732 4876 msedge.exe 46 PID 4876 wrote to memory of 1732 4876 msedge.exe 46 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 3124 4876 msedge.exe 81 PID 4876 wrote to memory of 4808 4876 msedge.exe 82 PID 4876 wrote to memory of 4808 4876 msedge.exe 82 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83 PID 4876 wrote to memory of 2680 4876 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunijty.com/gift/63882993771⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc3a9d3cb8,0x7ffc3a9d3cc8,0x7ffc3a9d3cd82⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,9150647729163915819,7846299933768197362,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ca47243a11039329b51bac975693b412
SHA18c716cd92f21235c431fb0858ef360d22ebcb62e
SHA256af3688f362ed307885dbc934dc41c1805e7108433e248273a5ef5b364b2742a7
SHA51253e41c15f8df503776320e5272342ee411e5185776364ced15c435e461c25a871fee9305f9afb88084868aad3bdbf0a64e65b96f350ef66942cc41dc05a2e007
-
Filesize
152B
MD590bbaa873cb1024ace83f887dfde38ae
SHA1922416490e14f9098df969a56b75e7523f108e53
SHA2562ff8abbbdad2acf5f04a3b47624055a0f2c36a09b0db3945b494f7eb92ae87bc
SHA51260587031845ee5ae354c760bd2714a47ff561d3bd6e8aab7b2073d1b9c6b544c7eca94078d9cdefcd87b44adce4e814852c1e8f6af8ca3bdd5b0ddd0312e57b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5d119f4097e5ff6a714809ea5477946cd
SHA1b924b9f741c4c299ec6776912e61cf0973d32c41
SHA25673af87506f8bc597765a3585c3835a80fd4b7e49a3aa9d830a7ef1895f2bb16f
SHA51238ce2779b917f24e07a9976ead2b2c3c558736f11520d17341f9847333b88e5e515b9a0cfeed2749343018807ee4c0e7907975a0e4eef3bad1ec801dc93a4579
-
Filesize
789B
MD5e267b17b791e2431f727a1decaefb2d1
SHA132be887c59d785ab612648aa41adffb26c90c1ec
SHA256b568c2c829a42a84e84fdcc254badb99985a6ff9a7d077dfde65f04ef231645f
SHA512ad9e201a3c99e6c0011dc285f5e0b10d379a6e007a2efc73682545cc9e162ac8d5b652174320186863935902ecb88d530e145b60fb7d48efdd5090791e36552e
-
Filesize
5KB
MD55cecb0d572b617513fd08c7e1bb6ad6d
SHA1e90da5f7da1964c5ab73c5a45c07d9bcee6990b0
SHA256c075c8a4fa6821e14c7fbc814f2a54c979cc7c2385997936ee6359c6a69f003b
SHA5121e6ea73bb662c16d1f99f0a4c28350986219c2a5eaa85d8d57d4de6a57637e0171c10a8d214ce09aa8e10976b99ab8a36fd1af7bcb64eb4b23b7e7072756880a
-
Filesize
5KB
MD5775cd8c4bccf97a39627b475db1f0131
SHA1542f54c1043000beff9b0c918217f8926700a126
SHA2566fa59daae96a20c41170317e25facd230112eda0a5e745752bf75f07aa947bf7
SHA512f8631b2ed8be6b23aeef1bc14ca804f04ec3de52ec1562b1ca74845eb502061e5ce20a55af44f82cc0d770043206f506a07377b42643eed3801ca8a870db541a
-
Filesize
25KB
MD538e0f825a71c236dde48aa2f551fc800
SHA11aff06111b765ed4e382b9216101e1f54a09d73e
SHA2568018002d860e6370cd760a83b61d41f77cfb9473aeafbf630b27e4b4a7c100bf
SHA51228fc9207402287a3742a8b409aa0db3d570cbd8e456c4ece1ced7b34b6d22f8fd0a2f699142090a9fe54062b35082560012ae80aa9785ce2b21da0aa9bd40399
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f48215595b1ea1207971dff534af3eec
SHA18394728e0433b31b661c81e893b497865e704044
SHA2562fb4135de839c28f9f2401d729a6ab8ded6a9ea1f557fa8782f199c9ebba0c2e
SHA512ecf0cce30acf33dac42de156529df0d0eb35c2cc8b203ff09183f9d6b5a4e3ef95ce1545ef13ed3e822b7fe4094dcaf1b6eae8d59f702bef14bea64220894251