Analysis
-
max time kernel
61s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 09:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/vPhvIA
Resource
win10v2004-20240226-en
General
-
Target
https://u.to/vPhvIA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 852 msedge.exe 852 msedge.exe 1872 msedge.exe 1872 msedge.exe 3304 identity_helper.exe 3304 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1872 wrote to memory of 2152 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 2152 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 4708 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 852 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 852 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe PID 1872 wrote to memory of 5084 1872 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://u.to/vPhvIA1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c9d46f8,0x7ffc6c9d4708,0x7ffc6c9d47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14170702601664761462,517596685740460161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
384B
MD5e0b691c80021bd45733e22e62aa0d404
SHA13debff09b19f92b0d0975f5fdeb2116915178809
SHA2561896348bfad34555cfa57d9dd6763a6786f88d6de1f0fbebe5b0ef361998599b
SHA51268d68f8ff7190e9a2fd9d2a22bb4ac4aa988be789bd1cf0453aa170bd8574f4c7a94e44c79c00532e45735fc184d42c69a6015cec38ffd3e944132befd0bc84f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5e9fc0a5356967ae70a8b8d61b2c2d538
SHA1524a532030b91212ccea55951b4e9bb7b3fbc86a
SHA256753f85080b8ed569237fbdee35de6eafaaef77533eed52ae98b6ffce3bc4cf0a
SHA512de5939b0b563c0f964edfb9a134f565357662da3ec5834c0ea3dde31cebb4e25a05dc1ecc6ac27d059d8a7bf5aa4f70b89f79d78b3979b8d0d9e1d03e41fb9df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD521f87b22a18b02f438b493f26dc6f389
SHA1cf2eb70f46b2db4738941d669ebe94b46557d4af
SHA256d63bca9019632db6b4de78a1f36b1df2f38249da9a73bf49c160306c60431573
SHA5123f0bcffb330b41df85fea33aac9e76c27afa6a3d39891b8900999368ad034c08ebc8fc3c4359fed4b38d07eb83a3dd506d936e52477e73c82c117651ede47900
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD54f2146244407b872127c73904fa143bd
SHA173201e2401756d8147409b6f0718ade5b2e2a4b8
SHA2567faf0060a428dc89948df412ca693453203d456c020a82a727331553054191ff
SHA512cee3136c75ee8d81f70cdfd5bf5ca019b31213e86320e44cc136e0aded4eb67aa63b3ec3e364bda55294f4e8b92ed466e7ecf4dd655455220771dcb35773aaa1
-
\??\pipe\LOCAL\crashpad_1872_ZABBZZAOAFMEPWYSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e