Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 16:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://keqxmo.masculinezone.net/?utm_source=f82757e39b1a28a9&s1=213651&s2=1995919&s5=.&ban=tiktok&j1=1
Resource
win10v2004-20240226-en
General
-
Target
https://keqxmo.masculinezone.net/?utm_source=f82757e39b1a28a9&s1=213651&s2=1995919&s5=.&ban=tiktok&j1=1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2684 msedge.exe 2684 msedge.exe 2092 msedge.exe 2092 msedge.exe 4436 identity_helper.exe 4436 identity_helper.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 944 2092 msedge.exe 86 PID 2092 wrote to memory of 944 2092 msedge.exe 86 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 3676 2092 msedge.exe 87 PID 2092 wrote to memory of 2684 2092 msedge.exe 88 PID 2092 wrote to memory of 2684 2092 msedge.exe 88 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89 PID 2092 wrote to memory of 4760 2092 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://keqxmo.masculinezone.net/?utm_source=f82757e39b1a28a9&s1=213651&s2=1995919&s5=.&ban=tiktok&j1=11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8590346f8,0x7ff859034708,0x7ff8590347182⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,14822986597102662753,11326458198004909628,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59a9fbb311103a725f2b74c195ac6a36e
SHA19460e47905816478bb9555ca16f33b8a33faba52
SHA2567352b1c9b4fc5fe20dd4038d7c0db9511dce1ea4fef0f7616d4de065a91e7304
SHA512c01d0125e1bf615a9fc7744d873ba51eabe9fd12a954edb3f33268b8b1f844a3ed47bc66b49108622e29bc4fa6f388ad15052504380cd3a7554438551fc44a4e
-
Filesize
859B
MD5bda272fe2fcbe5fe48f69e114cceafa9
SHA1f39e17a0ef45ba79f6e13f52f2967a378c5eef57
SHA25675a264396eb0289151918e2cdd59d432a8bb7c20b5add14a906e3da15bb0c166
SHA512647f2c19d7d8eb9d3dd98f967cc26c48b05eee19640b71bd4ef8083dc19664a033e2abf967484ef5f7dce1089958135bdd6ef8c35118d47341b1f6ecf1c5fb37
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD504871add27418f68fead8c61b32c245b
SHA14fecb765e6eab61b806cac201caefa06f8290ca9
SHA2564bb1e16835630c7eb1dde585a3cdb44a0dab663b4f9e4f0e64a269601c029c46
SHA512db1dfd219ba296c241172155b2ced5ed0a502a5775e21e3fd67e367b2ed46ff90379ed764a4d090d4d71f31310d6801cea3abf79ab74c300497100a1a093929d
-
Filesize
6KB
MD54616c9f541f017253a13582ff441e5dd
SHA1ba4645ebd7a713faffa8a615a4709f692be493cc
SHA256ec1bf4a4749ff894944fd47293d869475996c4089e7f96da771480dc2e9d184b
SHA5121f11581dfdc9d858bf183053419d10f500ebe9e2bc5afd98693520ffcc268d10786408909961b3497305e282a9a6e131bda4a836cf50c02755ca1cad3a05e256
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD572c6addb5f1e415bee5e353400bfe687
SHA1259e497a7a282b9ada391b3190921a63d9b8d71e
SHA25609ca16f30569aeb3110cd660bdee4cec10c78a5c27deb6131c88612df534b52f
SHA512145965efdad1e17b49475fde9df48ef1dd2f5ac9a6b84c05ad5901858a1da7cad455819fe02eba0d75549a9254556ad4ec12635e63c50123a5682a8467647ba1