Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/04/2024, 17:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.typeset.com/play/XN7QM
Resource
win11-20240221-en
General
-
Target
https://app.typeset.com/play/XN7QM
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 17 cloudflare-ipfs.com 62 cloudflare-ipfs.com 63 cloudflare-ipfs.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 4056 msedge.exe 4056 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4568 4056 msedge.exe 77 PID 4056 wrote to memory of 4568 4056 msedge.exe 77 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 800 4056 msedge.exe 78 PID 4056 wrote to memory of 2256 4056 msedge.exe 79 PID 4056 wrote to memory of 2256 4056 msedge.exe 79 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80 PID 4056 wrote to memory of 788 4056 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://app.typeset.com/play/XN7QM1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcac4a3cb8,0x7ffcac4a3cc8,0x7ffcac4a3cd82⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2000 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,11337827738261747718,9542303679917171140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:1892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
Filesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
Filesize
5KB
MD57d80fe489c7bacce09869db148a6bae4
SHA1df45db491674a7b538ef89014b6a7bbc51886a44
SHA256d7a13487dde92005539451f67fbc5e5b2142903db12d58467cf868d2fe5baf19
SHA51236ed81522b0c60d09272842df096805f75fcb4122aaefe00395c4104c048f2fa9f7e2cd35e5668e88fc827196adb1803f545ebf5c53167a360c772f116621658
-
Filesize
7KB
MD54a25e4d2757c30dfa5da05c7edd80a19
SHA1d974f56da481f14dd0e1f772c8905ec22437cd67
SHA256dd851cc92b6c6a5a3e2d060a89866e758836d6381977ddadb0bdb45f37f919fb
SHA512a7831aacee6faba571e689dc3dc70f6e57ee66c06e9f270115fa89247113cf951f44b40169709cb5de7e4708df71340f091fe76c41ed64639cadf68c31ea6959
-
Filesize
11KB
MD5716a71c115adb28ddb061e084bf8db22
SHA12a2c5208e45ddb913e6ed137ae77eaa09bb20c6c
SHA256633548c254707471af6ffbf2bed5ed5481ac56a97386134a5673791a90f75345
SHA51254823b9a671f0718fdea2c3d4d769de671da37ee26c9bc840af917f2de8cd42ee94c6c94f07aa66bf4cfbccb1be2866a49ae8008919ddede95ad5b66de757872