Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 12:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcomunnutiy.com/gift/activation/feor37569hFvrba3
Resource
win10v2004-20240221-en
General
-
Target
https://steamcomunnutiy.com/gift/activation/feor37569hFvrba3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4892 msedge.exe 4892 msedge.exe 656 msedge.exe 656 msedge.exe 3904 identity_helper.exe 3904 identity_helper.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe 656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 656 wrote to memory of 4972 656 msedge.exe msedge.exe PID 656 wrote to memory of 4972 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 3884 656 msedge.exe msedge.exe PID 656 wrote to memory of 4892 656 msedge.exe msedge.exe PID 656 wrote to memory of 4892 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe PID 656 wrote to memory of 2056 656 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcomunnutiy.com/gift/activation/feor37569hFvrba31⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd515946f8,0x7ffd51594708,0x7ffd515947182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13890859818266513815,4451491302101414992,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5352 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD53bde7b7b0c0c9c66bdd8e3f712bd71eb
SHA1266bd462e249f029df05311255a15c8f42719acc
SHA2562ccd4a1b56206faa8f6482ce7841636e7bb2192f4cf5258d47e209953a77a01a
SHA5125fab7a83d86d65e7c369848c5a7d375d9ad132246b57653242c7c7d960123a50257c9e8c4c9a8f22ee861fce357b018236ac877b96c03990a88de4ddb9822818
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59cafa4c8eee7ab605ab279aafd19cc14
SHA1e362e5d37d1a79e7b4a8642b068934e4571a55f1
SHA256d0817f51aa2fb8c3cae18605dbfd6ec21a6ff3f953171e7ac064648ffdee1166
SHA512eefd65ffcfb98ac8c3738eb2b3f4933d5bc5b992a1d465b8424903c8f74382ec2c95074290ddbb1001204843bfef59a32b868808a6bee4bc41ee9571515bbac6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-indexFilesize
480B
MD5ad631e1c00bf891c824d7bd5738345f6
SHA116c71cae7e33c6300e9d22518b0a0cc2b091d583
SHA256cbaee7dbed00c53b740da7a62c6e2d3edc35776772e85cdebc84f7d4f64d9256
SHA5120b0c2f35d1702b50a5c1802d0d6b14625788cc5bd5f15a88118adf27f5e18ac8676287ce7ea7cec96427cae619293d6aa3d3e0c907b2df8d3da1fe22026552bb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
456B
MD59d3a65e9bde844c40cc87b8159dc5d60
SHA19c97cb4c853c625d92ae70af352a14890886ff06
SHA25681f7e6b51b9e77fd814bf0f3adec5199da7f9446e00f2f7fe34eefdf387d1dbf
SHA512ab04198a18af8242bbe33c8d4a6c7680001dd513887f7ea043dc8c13814ba2821175553820e623aa38d244b702863df8c446beeaea69ff517365c446131df79c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
528B
MD560873973f4376c03ac35df5c9791af78
SHA10c129629c9fbb4524961d63972fee125bf74986e
SHA25616888baf9970d2628f2b88d0811521c2905e667336c455573be7e53a686aee23
SHA512f9e5c6bda6ca38cfc96e6c6ecbff8fe252ae83fc5b175a443e4b5757e92b9b3406729d769145dde6403c68aed2dd160f4fde22c14a920e43c900470c8691caf9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
543B
MD56b1d851e40bf15cee861a751a349d1e7
SHA133ea367bef99c3d561cf4f606a3ebad73ba0ff6e
SHA2561a96894cbefac549bb17857ed8e1d5134eb92ec29d78aa93e439b4d41eecd9ef
SHA512dea4b5cc0fcfdc134cfb61d2ad6c1621e076968a768cb75da238a5dd16c7caf624f1ef793e72e493643166f6da3ff499c6180440bc18b4699fd8f314b2a3a36b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5d436d44d0f4a515fb33a5cce2318d4c1
SHA11a1932e10c2803bb3ff5511963ebfba835005f86
SHA256ca7a59955058a751a91ece24a1ab50d9eb95bd15aca10e6367fee2e0f24b1fc8
SHA51282d15aeb3ddcc455940abcd460288488595d51e4a6cdd4d333c5d8891ecc25ed66edd6b9f8fffb4f1dfe5425bee869cc54027ee782f4bb33191e1834cf6202bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD53f6dd5a0239b8b8fe86d21b5758af324
SHA1eeac32aacdf41350ec621ed3e391fcfef05899d2
SHA2566e562ec0030d619e86c0c39c90f9565a896a1705477348859a7387334dbd4903
SHA5129c6a8b3212d3a3ef79270e7822a618ed667ac4f20dab43440f8f57af18197b7aa22e1eb5d92b565f1abcb763587b9b51cc9092b16d24875d486e0ddd818b1f1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5ccd7985d7a139255e69489288fc65b1d
SHA1852d2d7be7691bf61cd8f07e6b3d9034be1181e5
SHA256826414efd94a56014ebf3fbe537f00ddf2d0beaa755430ede02f555e351c41a7
SHA5126d648bea1041284711086d69b434053eeb07a473a9937ffc53b17207ba382dac4c52ae9e3bc6348aab0ea7f1488d8dbbf86b4ac6bd54fb0c43d7fbbd2a8e3668
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5ee187926c65c101843b10de1a8e1ebb7
SHA1f348a3cf504c9b73cc71b1effec1a5bc5eb2adb4
SHA2567d7b2b7b82ede6f7cfd0e12a9225c275041bd134f1cb444c0710a2c59b912fe5
SHA5129b64c3eeb3bda7a571f5c51ae4964290d98cea00161a1a6ae9f00b35e00657fdd6ce9980251aaec071a31a5343ee58450697242b8a06fa9fac621c5a154067d1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
\??\pipe\LOCAL\crashpad_656_RPXSAATMDVCODKZLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e