Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-03-2024 11:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.upload.ee/files/16338433/Password_123.zip.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://www.upload.ee/files/16338433/Password_123.zip.html
Resource
win11-20240221-en
General
-
Target
https://www.upload.ee/files/16338433/Password_123.zip.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 2760 msedge.exe 2760 msedge.exe 4028 identity_helper.exe 4028 identity_helper.exe 3264 msedge.exe 3264 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1984 2760 msedge.exe 77 PID 2760 wrote to memory of 1984 2760 msedge.exe 77 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 2716 2760 msedge.exe 79 PID 2760 wrote to memory of 4940 2760 msedge.exe 80 PID 2760 wrote to memory of 4940 2760 msedge.exe 80 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81 PID 2760 wrote to memory of 4908 2760 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.upload.ee/files/16338433/Password_123.zip.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff17c03cb8,0x7fff17c03cc8,0x7fff17c03cd82⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,4234311221501680159,5061078105445512322,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a0407c5de270b9ae0ceee6cb9b61bbf1
SHA1fb2bb8184c1b8e680bf873e5537e1260f057751e
SHA256a56989933628f6a677ad09f634fc9b7dd9cf7d06c72a76ddbb8221bc4a62ffcd
SHA51265162bf07705dfdd348d4eaf0a3feba08dc2c0942a3a052b4492d0675ab803b104c03c945f5608fac9544681e0fe8b81d1aaca859663e79aa87fcb591ddb8136
-
Filesize
152B
MD5ded21ddc295846e2b00e1fd766c807db
SHA1497eb7c9c09cb2a247b4a3663ce808869872b410
SHA25626025f86effef56caa2ee50a64e219c762944b1e50e465be3a6b454bc0ed7305
SHA512ddfaa73032590de904bba398331fdbf188741d96a17116ada50298b42d6eb7b20d6e50b0cfae8b17e2f145997b8ebce6c8196e6f46fbe11f133d3d82ce3656db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5b8989fc6f062e085460613a4d9b8dba4
SHA187ff55a58988c869d78f279d1ca02caf48178938
SHA25657c5735edff594c981f0b7ea5ee2e586b1e03f95297fe26185d42d0bd9a3fd4f
SHA512bc0d14b79cace978dffac14921ec23c5fe88721e2d3830f648350abc4e75bc9b676671a24df6c966dffd67b8ace288e28b227f69f4518ca7453b0aafa93815db
-
Filesize
2KB
MD5055f013c5a570b860855b5cf7db5fbbf
SHA16a44bfa1b066e8c161e0f2da7f82d372d9fb1413
SHA256209765d6337d791545208d3aeb746b03833ae88b2dd6a098ec1bbe93b5a76383
SHA5127023fe8c849a28465171ca22caeb066e34de6c27e57e6bfe1c8c13cd4cdc5816754ec7bf9acd186c8e9986d28d68201a4f060c0f07967866bd40cad9b1e37d44
-
Filesize
5KB
MD57f67dc11a9f1d4e8d1442aeeb68fa609
SHA17451de75e0a8d6ce4c89f0321b2df121bb44c247
SHA2561b8ec4ca491921b86a2261ef9850b80598a034badc3dd58fa1e32ce2af68ea7e
SHA51217e3484702d4efdc1183fa14c142c85a29ad569c5ecd7822a8a78999986b71c546df9bc91cad33edfdb7ad0e7ccae561979dd5ccf2b55c1e334fe647f13503d0
-
Filesize
6KB
MD5955a71695acbb47b8c74d10eaa5e732e
SHA184637293ed2c108ffc9e572ea55dd91610f5a085
SHA256052f224670a4de36ca48f9500dd07d24c92bd5cb55ef093756cf3e559a8253f1
SHA5120c4f80a8b3aa985cb9c0279b37215cbd8efc92c9e6a7734765fbdac5cb6b5e3614a03f204334b9cb5fb7602ee66f3c7a5d1332d7df4afcd4a599c1ccbcc6bded
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50301d7b4590132e2163d4f27789fed04
SHA123dba9ffbbf7a53c3fc126864d60aba9806aef04
SHA256519716228fd836dd7d9c2043ceeab065b0e1b643e446b4d52aec82958c56e63e
SHA512f1e56f0b82502c49adc1fac838a503148e05e8ccc036cf84b3debed62da8e55574123ddadb7e2db959227b9735c843f49ee5995087530203c191b43907128d5e