Analysis
-
max time kernel
1798s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 16:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shrturl.org/e/SE6GKrGR-Ltq
Resource
win10v2004-20240226-en
General
-
Target
https://shrturl.org/e/SE6GKrGR-Ltq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 2716 msedge.exe 2716 msedge.exe 2448 identity_helper.exe 2448 identity_helper.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 3056 2716 msedge.exe 52 PID 2716 wrote to memory of 3056 2716 msedge.exe 52 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1176 2716 msedge.exe 89 PID 2716 wrote to memory of 1520 2716 msedge.exe 88 PID 2716 wrote to memory of 1520 2716 msedge.exe 88 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90 PID 2716 wrote to memory of 2812 2716 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://shrturl.org/e/SE6GKrGR-Ltq1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2d6246f8,0x7ffc2d624708,0x7ffc2d6247182⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17261377154077694895,8152101947195894604,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD502a0f928de6ab7ff4cb8be4cad0579e8
SHA1f8aa8aa6b7e9e788a9234b32d1e66fc9a3df4c9c
SHA2562ed6bfa80f96f1a9dcb861770c1230765809e080a577f927a6c70a4bbe501ab9
SHA512fb3d787b8ee0ea9bb90f4065fdf7b308bbb9872ae99164f3ac64a591ce88e1cdb6c424043325a104b55c01364389db88a12d78bea6e60ce5b4137f7ee5782a0b
-
Filesize
1KB
MD5c0736aea8b632fc178f9e62e9e81bb3a
SHA11c1ac25c3699f8b645d93d5c6b36344bed29cd49
SHA2560fb94d6d57d039d9009ca172ad6021b89be01274018b9d603da087d8a9857625
SHA512aa3fef6272f4148f648757d4e00bdb5a01cb63a017f0ca2071aa18afca50f8862ddf685f735b91bf88a9ff73054e30fc402e40f575a11bb542712d671cde1d10
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD552002ec3300d433277024706da8e6249
SHA166f040cef0e943eead50418f5444cc6bec3ed198
SHA25648fab884f192f442744ce466c811a5b8da3c8c440c0a2cfc7855fa1cdbd72db6
SHA512eec2ea79bf9e305224b8ef94b07b686a07dd2f5b4206dbb16c51fe9775d75d5f1b0e74f6751eb5038766c507d749243ac7ed6f4411472be3055344793ba1cff6
-
Filesize
6KB
MD5255394b441772bcacdcf90fbcfb93466
SHA1a75190a0a5500bd031cbdd342b2cf12b0a1fc533
SHA256aa0d710399868ac2767b1c629f969a33e2a078e5bb32eaa064418228e6ef6e58
SHA512e52e6508c99468788c7409ce9114e017e000e1126b04eec1836317b97b3ca32d7674ab7827a9a1aa9362fb021f2fc05a84e2ff9f631544da6b69ce9d1b4a0478
-
Filesize
1KB
MD5f6214a1ead3cc6566f1de02d6bfd42b0
SHA1fbe7dd5381e6814e37747358aee140714462da8a
SHA25602dd8fcf8cf2af75349ff6668e1c4f278c4fb15b1cfb664916702e2bc54890cc
SHA512e111ebdd0ed695d81c0aa77599c5f43dfef50d7dfe6bbfe2772aaa8199122dcb94e2547f900e569d2092f736e2a4ba4518d8c0f0c3eecb19ef19691871fb8430
-
Filesize
1KB
MD54d4d515beedfbe882c3176194b2038c8
SHA18058ad763de62973ed1d1096b04083fa39d9cc42
SHA2567c2cf93b5d716fd6fcf8e61c4124daddac0387f01eccad578919d31d6506887e
SHA512cacaf47ab65a3cb548e8adf63dac14f22ba4cfb488ff50e613bc12697146d181f6f8537bb7acb0a2e96fa6dc5598524febbeb946af23d615803d97816772d4b0
-
Filesize
1KB
MD5280c1fd67cf2155a6839e3788ae99fc3
SHA1b8f274b8d8a67a50231469ca4139f415876e6eb1
SHA256dcd7706dde7b6bc91643e6b40da24d4566bc785f6cdc5319e0337c0eaef9a78e
SHA51278a36d434821f7b38d768fd255c791d06649248270a07994dddecb4cda01059c1e59cb4dfc5e80b77d8a14e26c1d758248cf702dcd67758f586e2821376c39f3
-
Filesize
1KB
MD5e17ff6ccde6dd3fec447aadff0ce661f
SHA1602287c1126ff8ac52a8a57ab9098a753a2ab7b2
SHA256bbdc09dbdba4c848b677a7fbab43bfc7459dbaaafa83a661fb92a252b4046b5f
SHA512412589f0c9e9cc9afefc8e836cb593ab95224caf196f094064d75b873829fa5e7e21b82ef5b763c09175682c380a086da140dc7f60d14cec37071c52b0041091
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52fdfa17b8e9e835357949a5aafdec198
SHA13eca30a394bca4de9be894bb68d58eeddda72992
SHA25694b75193508e9642d54369a7a7bd3ad29b9ef60c51df16cb9db5dd0ad71f9586
SHA512302d6e18ed02bef1bf612f5799137e5be4b6db1bb931319232130a2b0dec8be896f0cee0901d2efe5e91d90a8c84a4935c0e458f9034f9b7a8ca9fcf0dd3f0c1