Analysis
-
max time kernel
1770s -
max time network
1811s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/03/2024, 02:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://guilded.gg/laffs-Cadets/groups/DMlAejm3/channels/31c74069-76f7-4e79-a328-0e8a71c30cc3/chat
Resource
win11-20240221-en
General
-
Target
https://guilded.gg/laffs-Cadets/groups/DMlAejm3/channels/31c74069-76f7-4e79-a328-0e8a71c30cc3/chat
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-647252928-2816094679-1307623958-1000\{4F92BAE1-7B20-4836-A199-EDB7934AA0CC} msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4796 msedge.exe 4796 msedge.exe 3504 msedge.exe 3504 msedge.exe 1032 identity_helper.exe 1032 identity_helper.exe 4944 msedge.exe 4944 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe 3536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3476 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3476 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 5008 4796 msedge.exe 81 PID 4796 wrote to memory of 5008 4796 msedge.exe 81 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4132 4796 msedge.exe 82 PID 4796 wrote to memory of 4784 4796 msedge.exe 83 PID 4796 wrote to memory of 4784 4796 msedge.exe 83 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84 PID 4796 wrote to memory of 2388 4796 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://guilded.gg/laffs-Cadets/groups/DMlAejm3/channels/31c74069-76f7-4e79-a328-0e8a71c30cc3/chat1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb67603cb8,0x7ffb67603cc8,0x7ffb67603cd82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2212 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4420 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15215911492834221790,16021005921786218372,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1388
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004A81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5e46a49df0cd60e195b26be12f8370b78
SHA1cb0546ee13d41eb1dbd455f550b4bc1052496ae1
SHA256fd986498d83adb7c6abe8ab019ce61ad2a95855e63c351e7aa456e98cf3976c7
SHA51219d7b27a1a0fc3601bdf834e7a08dbe2d5dbae0d35fb6b573668cc1498ae208f52c5ff72b7c058293276a86955a64c3d4a3aa3ede1b1deaa9620a8b88dd5c764
-
Filesize
152B
MD512b71c4e45a845b5f29a54abb695e302
SHA18699ca2c717839c385f13fb26d111e57a9e61d6f
SHA256c353020621fa6cea80eaa45215934d5f44f181ffa1a673cdb7880f20a4e898e0
SHA51209f0d1a739102816c5a29106343d3b5bb54a31d67ddbfcfa21306b1a6d87eaa35a9a2f0358e56cc0f78be15eeb481a7cc2038ce54d552b9b791e7bee78145241
-
Filesize
152B
MD5ce319bd3ed3c89069337a6292042bbe0
SHA17e058bce90e1940293044abffe993adf67d8d888
SHA25634070e3eea41c0e180cb5541de76cea15ef6f9e5c641e922d82a2d97bdce3aa3
SHA512d42f7fc32a337ecd3a24bcbf6cd6155852646cae5fb499003356f713b791881fc2e46825c4ff61d09db2289f25c0992c10d6fadb560a9bea33284bd5acc449f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD519244c0344f2580f8979d048b659b796
SHA19bd68df867c00ea4e782cc1209fd6b6d3c78df68
SHA2563d29b883cb13075558c872a4ad6e09b7ae69756635332eede9c57d42a1bb846b
SHA512cfc7bdf6ac236de25c3a8b021ba17d73556d592c77ae316f4d390f57e8a81db243bd3af83771537c28b833ba3318b78db1fc44ba7a8ab380d948cd6d2b983b16
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
323B
MD58cc8c2612f81d2d892e5b9535dde37bd
SHA17c729bc56a1d5731b53a98b6caaf1056da842153
SHA256bfa32f142026dcc3d77ca3aebbe92ae0c43d9b922ce83226fc885134029d1529
SHA5125853a56b499a6a9d40502e00f4094fffb3a9ffdb46eaa7b0b3b58b341def62f3c125483d239233767cf90f8419630c5ded0b9ecc2e5a316371c996ca6e96a5fd
-
Filesize
5KB
MD5e6e3741015c8a9ec6664a2f57fb1a6c4
SHA14600c70bad3241d35b390cd19d53ddd22ff3547f
SHA256e8e0035c97e064bddfb5021043bae5cc793980c6357c6afc6e96debeb1c0c17a
SHA51260de88a2991c1aba58730bf3fbdf5cb1eedadd4d58a81f8156638c43b4bfd46d15333f8eb30d429699e6fd53f8a970bfd93b344f1536472f38b353dc511cdf07
-
Filesize
6KB
MD5f85335f0e9712736ced901859b16e20d
SHA19997cf57392a322124dd50539c894bed805c50cf
SHA25658266e8b128481f64c858481bd43f7179b9bd0fc7e1e0e01b1edb473d60cd4dd
SHA512e7d8fa001d3835a2ab630847905ae4ca4e4e291469ea370d50a59efff25e4895017f5ec6afc88454d4440b988fcbe47fa694c200ccc9572333aa17ca4d720527
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389