Analysis
-
max time kernel
1781s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 14:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcommunity.com/profiles/76561199056957799/
Resource
win10v2004-20240221-en
General
-
Target
https://steamcommunity.com/profiles/76561199056957799/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 3324 msedge.exe 3324 msedge.exe 348 identity_helper.exe 348 identity_helper.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 2260 3324 msedge.exe 14 PID 3324 wrote to memory of 2260 3324 msedge.exe 14 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1512 3324 msedge.exe 85 PID 3324 wrote to memory of 1088 3324 msedge.exe 87 PID 3324 wrote to memory of 1088 3324 msedge.exe 87 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86 PID 3324 wrote to memory of 1608 3324 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff81c346f8,0x7fff81c34708,0x7fff81c347181⤵PID:2260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/profiles/76561199056957799/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16374455668782317874,1354379556588070381,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD5607b7891e2b30c80357705d9fac781bc
SHA19b585815291343908e77d5b8f279ef31366280a0
SHA256b872b9f9cff6893a98e56c4ae4d64843ed7185abcc9b763dfb7352a7c9c69d2c
SHA512713e3fbb946342b137d916a937baed21dd9000c6b9f527a587acb6ceb50c4b5fec7462ec56377ef44f1a5fc30d77869b609ca0638f13273697ba9ca5337719bd
-
Filesize
198B
MD53d4a413e2fdece0c09eb609e5b8d6238
SHA1a1571e0b1bb232c126592501f0602221aa12f929
SHA256778c0b7c7c09a0628c155bcac0fba669b95807a0df16cf0111d9e19d5b3f356d
SHA51205f855e5fa14fa35aa4a8f780bc35b3f71d0c7ddba8d51ed9702feb2743973087fa98a7e0472824810b6f55741385783a3e330fc52faf02e8ae02da85027d856
-
Filesize
6KB
MD5e7cfeb372cf99c29f8abce0c6f99be8a
SHA1a28b5501553082ec3b6f8c74dfdef372add52ab4
SHA256a9198cb639db899051ff1920b3031fbf7d5ed4c7a3ede43371509d79a556bcfa
SHA51211c22e237eb9012e2ad332ce4a7e53b0ff7f90885a83f5ea833ed07edf7df557943e72c54c012bc9f7dba212c39879f18044f2c4f384781942942ac0fe9ead75
-
Filesize
6KB
MD56bb6772ea357f6eedc818aca8c1dd57c
SHA10a522ca0960fc28f5673be347e2df643e691c38c
SHA25633477aac302ef02fecd82ca9daa56fae6ba28efe56fd9466cab24a147861ba25
SHA5129c19c747e958dd3be0bb064566de2ef831f58624ece7e7dda61cbf16809b2f9da077008702bdb28baca38799aa2bec52c0ae419dbaf88fa4042d84a2b47b4259
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5dd2c4d62851ce636bcc0b6b6ace2ada0
SHA10a0b1c7942b8fcbb6cb3313643df0d4efc902659
SHA256b57667750b26fc7295634fec3f1deb79269565b1865cece76155240f44c4555e
SHA512123fd2960047cea0673ea81ce23fb95c48621336f5232319d1a959400fa30e5e2980230b5c5b662130e08748f743a75f3d098b55f3d1aca4e11e93770f17ca00