Resubmissions
22-02-2024 02:40
240222-c51rtsbc58 722-02-2024 02:22
240222-ctqgqaad9v 722-02-2024 02:21
240222-cs1ajaad8w 122-02-2024 02:18
240222-crhn4aad6z 122-02-2024 02:17
240222-cqrwdaad51 122-02-2024 02:15
240222-cptctaah68 122-02-2024 02:13
240222-cnv51sad4t 122-02-2024 02:11
240222-cmr2zaad3x 122-02-2024 02:11
240222-cmaspaad3t 1Analysis
-
max time kernel
71s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 02:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qsearch.io/index.php?rgid=895053&sub=gclid&gclid=CjwKCAiArLyuBhA7EiwA-qo80Fl0vnsy2OHsUXJJGYnKG_j2lxNW8Qn-qg0DZho6zscM5vaEKYSkDhoCYOwQAvD_BwE - Google Search
Resource
win10v2004-20240221-en
General
-
Target
https://qsearch.io/index.php?rgid=895053&sub=gclid&gclid=CjwKCAiArLyuBhA7EiwA-qo80Fl0vnsy2OHsUXJJGYnKG_j2lxNW8Qn-qg0DZho6zscM5vaEKYSkDhoCYOwQAvD_BwE - Google Search
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 3936 msedge.exe 3936 msedge.exe 468 identity_helper.exe 468 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3936 wrote to memory of 452 3936 msedge.exe 58 PID 3936 wrote to memory of 452 3936 msedge.exe 58 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 3104 3936 msedge.exe 86 PID 3936 wrote to memory of 2900 3936 msedge.exe 84 PID 3936 wrote to memory of 2900 3936 msedge.exe 84 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85 PID 3936 wrote to memory of 2884 3936 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://qsearch.io/index.php?rgid=895053&sub=gclid&gclid=CjwKCAiArLyuBhA7EiwA-qo80Fl0vnsy2OHsUXJJGYnKG_j2lxNW8Qn-qg0DZho6zscM5vaEKYSkDhoCYOwQAvD_BwE - Google Search1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcde7446f8,0x7ffcde744708,0x7ffcde7447182⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9596600717246874315,780476097293337049,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a65ab4f620efd5ba6c5e3cba8713e711
SHA1f79ff4397a980106300bb447ab9cd764af47db08
SHA2563964e81a3b4b582e570836837b90a0539e820886a35281b416e428e9bf25fd76
SHA51290330661b0f38ca44d6bd13a7ea2ab08a4065ec4801695e5e7e0dea154b13ac8d9b2737e36ebe9a314d2501b5ef498d03c5617c87e36986e294c701182db41b9
-
Filesize
152B
MD5854f73d7b3f85bf181d2f2002afd17db
SHA153e5e04c78d1b81b5e6c400ce226e6be25e0dea8
SHA25654c176976e1c56f13af90be9b8b678f17f36a943210a30274be6a777cf9a8dc4
SHA512de14899cfaad4c312804a7fe4dcb3e9221f430088cb8bf5a9b941ac392a0bbad4e6ca974e258e34617bbffff3bf6490fa90d8c6921616f44186e267ddaa02971
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD58cd1241e21c34912729e7dc127f90897
SHA17fc7559c617c31e6e89cf5e5c28b49eee1c1cf28
SHA256b37218f5cd9480062b536ada01c1127a72bf52de2ed49804bc477f97236fa645
SHA51235b53f81b69b498bce4c922290cef3eb882af468bf6a8f67b006a75a0c45038d9826008a01f888950e288c00a2ac26df447e1d9983e1a68f387f3ab7953eb91d
-
Filesize
1KB
MD50f3ec2ec15d0cec18e8926397d73b61c
SHA1b761f1e2706199e79c277418c55b7bcc9caea31c
SHA256de6a4411b63e01881e42347b834a5e1998c3ab9989c06fb8ce512569c0a8eb6b
SHA5121bfc7986a5de5132e9229a692ab6dc54bdcd8638e54c8b79006820b30bd348f3eb2a81b3164273004b7cb4f0c9d68a3a45ec1221d19b1f8c7685cdaff1b65b88
-
Filesize
6KB
MD5bc85d359c6f43081cb29b54e686c93e1
SHA157c284fe84f6de0ecad886e15c227b037058b52b
SHA2560d9baf2c0d995fe9efb924554984004c2811104a5ab94e827ea3f7bf8b24c505
SHA5126b31c0c1ec59ddefc49b8c6698993588af6bcb31943a61a686b02eee0520786cadaad5816830ecb8a27c564a1e1fb6d6f2e76afc38a205eb2f870cec2e2e0032
-
Filesize
7KB
MD5116e02285bd3d9c79c94e1152548bad6
SHA1f420c7dddd14836df3c3e6655465c69f700ba004
SHA25657221c818915582a48a469bef2dbd1e58c2ce03a9f11fd5e936d58647932474e
SHA512d08c3d358037149ac7e282ad0385e8fa70389db66ac57237868b7ea3b54931a0d749be526c760336f012a97379bf8b413083cc8bd348e838cc765e2c710f5a15
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50675378da2f84572b5bd9c3faff82367
SHA1d38c183969f817bd4d6aa37ba6936596826f1d3b
SHA256e128a0ce1bd481db5792b1647f1002040b150541c5085c6217d7f21964bb2be3
SHA51247b629e143474fb46f1f580db7e49bbd6fa2ae2b5e4eb6eff11357b9fd4e77c89db80e4baf172960c0ef6155534fa2d2a57a2862b0a7a87d3dd6a65a04c35a0c