Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 18:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcomunnutiy.com/get/activation/feoeeq82794hFvrbgea1
Resource
win10v2004-20240226-en
General
-
Target
https://steamcomunnutiy.com/get/activation/feoeeq82794hFvrbgea1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 760 msedge.exe 760 msedge.exe 1464 msedge.exe 1464 msedge.exe 208 identity_helper.exe 208 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1464 wrote to memory of 3400 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3400 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 3872 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 760 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 760 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe PID 1464 wrote to memory of 1608 1464 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcomunnutiy.com/get/activation/feoeeq82794hFvrbgea11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacefe46f8,0x7ffacefe4708,0x7ffacefe47182⤵PID:3400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:1608
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2024
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4520
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:4028
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2524 /prefetch:12⤵PID:4068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:12⤵PID:2012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7178385289105163373,11893837248578025950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:4836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
456B
MD5cb124bd8248498b31bda5e6463b50ede
SHA1f8a19b662fabc1f490d541b66e7e73ba5d85206c
SHA2560dbb37be23062029ed5349387617dc16252936f0e1cdcd78b5555726f1db7a2f
SHA51267cc01eb8d3d5facd2a55733ee5cb4978b28b91bc801c29e9dfa22edc8f0d9c34db5aaf1c4c6ce0169ea3f69115fddb2d9b985bf87d85ce1a7f15ecaee88720d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD56a199133d47c554c1534875cff35c8f6
SHA185b207c6403711fc900aa95acce9f4c877849dd3
SHA2567e3712196c29cec5ea3bde5d6b0501f2f81fef2f0d99ab909e5c21b6c954b736
SHA512d4d4efed3daf84192429f407be771f1ee504957f4afad907afa14bfd57d1cbe1cb4899b9063bb5786a0c135bdd27decb636b0b3ba4b2ad0b4e7d24d10e79e602
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD51c286bd036f98740e8929c1055e06825
SHA10a32f1ae952c104d4fc27cf16bfe24a3ce39fc8f
SHA256fcc6b929b49b4d1d89dd2e23df157640fa0f914467d728aad2d7e0a8e9fe1f1f
SHA51223fbc94aa86f285a57ba54d81e061b9da58275d00f0d56ee84b941a904806b9f5a27b0c65beee4a14c38b18a76875e202141d727bfeddeeba539805a17a381b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5abc803a7b970bc8dc305b4e07ac08e99
SHA13f23694c9244a14da13bd66da243b96f7e6ce6d5
SHA256e98e7d1ab7223cecfe6ebd70980849a1817a43b47a8f3a6f584dcc02cee82df4
SHA51250916846e75914427289e10074388a68bc46d82fdde7a9d1a8e469306fe3a479bc3bacf377606cbe3f4b425e916383795514d8eb9210f98b3d55db28ffdbea70
-
\??\pipe\LOCAL\crashpad_1464_PNPVVLBPSPHYQERYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e