Analysis
-
max time kernel
85s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 17:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1211159214685421618/1211159215419170846/mods.zip?ex=65f6696b&is=65e3f46b&hm=ec3680a07ad9e45981f8b8e04de77e5a9e2d5cdcedc4551d39f8be811bc98c18&
Resource
win10v2004-20240226-en
General
-
Target
https://cdn.discordapp.com/attachments/1211159214685421618/1211159215419170846/mods.zip?ex=65f6696b&is=65e3f46b&hm=ec3680a07ad9e45981f8b8e04de77e5a9e2d5cdcedc4551d39f8be811bc98c18&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 2092 msedge.exe 2092 msedge.exe 456 identity_helper.exe 456 identity_helper.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 228 2092 msedge.exe 89 PID 2092 wrote to memory of 228 2092 msedge.exe 89 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 4052 2092 msedge.exe 90 PID 2092 wrote to memory of 3808 2092 msedge.exe 91 PID 2092 wrote to memory of 3808 2092 msedge.exe 91 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92 PID 2092 wrote to memory of 4404 2092 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1211159214685421618/1211159215419170846/mods.zip?ex=65f6696b&is=65e3f46b&hm=ec3680a07ad9e45981f8b8e04de77e5a9e2d5cdcedc4551d39f8be811bc98c18&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff952db46f8,0x7ff952db4708,0x7ff952db47182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2336 /prefetch:22⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2172,1371516958271461277,17619373975511190040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD5544f223806ff0eff099b8517f700dba4
SHA19119975ff54b4b9a16c951fa2c8becd4bae5f9f2
SHA2567a9cc29d9c941385092fcf36c56c6d070254ca7429d435fa28060b158427bc7f
SHA512b4dddf8e9826b56e3d5e74e0997b3efe1ddedbf9df093a572be4eea69cc0e0d4897e38cfff05cfc6414bc5d9a3b9bc7e2c143c1034a9c7e2c0e104445b14b987
-
Filesize
6KB
MD5433ecced0c00366389245c7775876b34
SHA19c6c87956212c73b927748917b9fedce37db0c30
SHA2567035dff4a6d9bec731875f77e9ffa20260601ff9dae962e2f0a73f3d1e69e4f0
SHA512a34c78af89201813f612c295a8fe9813c112137b9f1136ef30fcf0ac307e27dc7e78f09116532b1d40960f6c56911f83901a463ab1814a53f2ad5e0162ac0545
-
Filesize
6KB
MD57bfe18ae5becafcbd3664ae60621af13
SHA1e59ccb74b76a6b9151ba8024365aa89f14785e80
SHA25662599396098d024518328af70d90822e72ef0aced682ae0361394da49b727efe
SHA5122b5e40c028af7a54fb9eef43c71d8702fe1efb86b8a925de680042ca8045d1cd8b304592f67ac5931152e91103f51e62e3e14324bd5de7f9c25f203901f1888f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ab0f4eab4462b650a0574ca04d857128
SHA13305c99d7c9e357ade26a2e6992952aa0637d041
SHA25650279da4f966017f8891bcab1a937602ae12345ddba46fb3b33601e77d22ba61
SHA512b3a898dada7fb51e021f2692e2e9f350a0d0d2df0284dde05b1ed1b0d2eaedc90f7628b6520f4c7c225d17227945789502fbe3d9a216eb318f97a223f12d7f36
-
Filesize
11KB
MD5356433c4d0959a86049e3e22a1c684de
SHA175f55f5d9036513e04ec5c6b8df3d7e253677c26
SHA256e0b5c7e49f73e16219a5e47a775289fd5cd015a11007097bc474bfd60fd86f98
SHA512a2e146ae7463de913d8513581c9bd3b2122f076c848a5295cdbaa90c27a37f1c5173c5bd98a89335a78f3695567f535e814f5a4cac63dbae1d6b18d2c4150c6c
-
Filesize
9.5MB
MD50dbcee7b23e62cdae7d802d9b17b34f1
SHA15ed48fcdf48fd1ec650c917aa42789e4c130106b
SHA256bbad3fd28151666f44582bfa0fd5c5357af2ef6c164ff6af69acbbfb98197b62
SHA512c477b028a09d71dec9652e888694b029dc791d019a63900df4a2c8f0a43d2308634c52a309589c1d8c4f8bc421463ff934e80b40edaa9212bb6628088eb8f400