Analysis
-
max time kernel
35s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 20:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tinyurl.com/2y7vz66f
Resource
win10v2004-20240221-en
General
-
Target
http://tinyurl.com/2y7vz66f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 2412 msedge.exe 2412 msedge.exe 2152 identity_helper.exe 2152 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 652 2412 msedge.exe 15 PID 2412 wrote to memory of 652 2412 msedge.exe 15 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1296 2412 msedge.exe 87 PID 2412 wrote to memory of 1688 2412 msedge.exe 86 PID 2412 wrote to memory of 1688 2412 msedge.exe 86 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88 PID 2412 wrote to memory of 3180 2412 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://tinyurl.com/2y7vz66f1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9acf46f8,0x7ffe9acf4708,0x7ffe9acf47182⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17174475782088340428,11514541502602747296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4db60c9bb06ea5452df26771fa873ac
SHA1c118183a1315a285606f81da05fc19367a2cdfe1
SHA256f168242e74bfde18bacb9e18945a39bb447188eba916c7adf0f342ed8d82281e
SHA512180ed98f9d5a14a22687a099c4a0ba6b586610f7b8b4c8de89f3b91713b07a2ef3726fcd318cb4e270b1745213b898037d29cca4b490d0c91833b797d69ac406
-
Filesize
152B
MD5f5b0bf4edca2187f7715ddd49777a1b2
SHA1eb78099013d0894a11c48d496f48973585f0c7c0
SHA256562016f9159ef363fcbe62ed13ee26052b31d4f67dc5ea6d60864a7d5dfa50a1
SHA5121039b98cffd32ca4c9e37486b96e01b167d76b19dd8440a21da4932d677c463f4c5ce2260239e8337f59bd61ff3111905e23ab71d3ca5b20e7d2935fea7952c9
-
Filesize
6KB
MD5f9346b93e4eb541022c3296673b78749
SHA126d3d04b7429556b5ccc4daddde259f55c1e0400
SHA256507a10d769ef20144565b14fcf1a145fa36d3c0a36e199ea15999815e3b8a674
SHA51225f591d5d15cc2cb4dd00b212d7a904f06e95e828e3526ed91e3d86cc5c26d3ac04c14b28d60a78fb89ee4416e18f637adcf6b2eaf68d3abbc50b7e8a8d0d417
-
Filesize
6KB
MD5528870a278f42cbcb2c456a87768a9bb
SHA19c50393d0e99738f3492a575dd4f3d8100c010ab
SHA25611697d63aa3a179362dc6260b285f6d8b6a13712e1ec0f338ad16cbe730e26a7
SHA512fafdb3fc4cff6d3b5d18eb8ce4036e8761524016d2c0c2ce9d0bcec9efe22b4f3dcc123a584c4894b9d23c0c157d28484775bc1521c325463a06545c2773beb7
-
Filesize
6KB
MD54e9402b6f29284ebcd6fd599bab23958
SHA19e6c5b28c911771667eab20c559780e558e6e2d1
SHA256452b9764a9893ff23a6c358da332d84bb5b19c0a93c79f197bbc215368674b53
SHA5128c833cf607fd1d1a3470a3b059c5e0802e120722b914eddec622111df87e46fd1a0970fe89bd4c382974a9a58ab9d54e9655da8cd4dd729134f294b03cc9dab0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\eba2a111-61b8-4474-bdca-93ec0c3da205.tmp
Filesize371B
MD5a3f29d42cae481cadd1753e3a55a2fb3
SHA1219d93e16334e6fd8400a1eca8e8dfe7ef97722f
SHA256a0b733b06280e6dc6935877251b54c3f7fc9f7a29d28ce6caef036f15503d67f
SHA51226ccff95d2818962102e94cffc34f3b1e17ab43aefe4d7e108ab9d95ec2f18b34a7533a9efe75cd19cda7dbd841b5107b87a2c4ee62acba3d89a3828ca08c683
-
Filesize
11KB
MD5a14e5efa4baa1b296a89e467150cc155
SHA163b9092b4a2d1ee9f714895a2d3f49811618bab9
SHA25674e687150d5f7ee043755c82e1cee7f124ad3d03f203dbdce2ec1e3ba164d529
SHA512213edabf5bd4b24de09367cbbaa180bd3235325e9ce1b23433ac3f1b84be13b73ec9a9f2656b936afde1d91d1bb71417d526544c81b47efc16690b3aa7b8ff2b