Analysis
-
max time kernel
266s -
max time network
248s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 10:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/bafybeia7zman6qqrlxy5ya6hrjb7ajyy55dnxj6kcwruuoeonnwvgzdiru/#redacted_email
Resource
win10v2004-20231215-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/bafybeia7zman6qqrlxy5ya6hrjb7ajyy55dnxj6kcwruuoeonnwvgzdiru/#redacted_email
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1164 msedge.exe 1164 msedge.exe 3760 msedge.exe 3760 msedge.exe 4776 identity_helper.exe 4776 identity_helper.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3760 wrote to memory of 4580 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4580 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1672 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1164 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1164 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 744 3760 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cloudflare-ipfs.com/ipfs/bafybeia7zman6qqrlxy5ya6hrjb7ajyy55dnxj6kcwruuoeonnwvgzdiru/#redacted_email1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bc5246f8,0x7ff9bc524708,0x7ff9bc5247182⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13583045678180116833,14363247766533203682,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\44ec1824-c85b-4a39-b344-e3c6aa5fe0be.tmp
Filesize1KB
MD5c0d64192d85b471bd87474b3bd44d538
SHA1cbc57b30a6fce6624b61fbaa36502eb42cac19c8
SHA256fdb1ec59771d130905ec79d539e131a10d93ca99f8bf195f2901b841e657b127
SHA512435788f82d79f0f2ea6ff1eb163649b4f235dcda50ac5051f34029e7d1a19c646a663d7cd952ee65db3ccef1fb6a795382a1fe0dc1d35c04692084cd50a49346
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD577661dde4c7f2e3fcaf5d2862cd12429
SHA15e0dac2fc8dbc817bc11c51866ed9ac6fed23996
SHA256a88a994a9787c286202a6067dc42d933c808a74dfb821625f98282cb13a8d5f3
SHA512ad6c24b4f3f58a3bb7b8a12af622db25152a733a48e37fff393f2bc0126fa3e2b21be4e1012a25ea2dca0fa21bbff96ad83f1bbaf9f79fbe083589b4fdc6cc83
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5b71723b9cb1ea3ee4d4b9bad6b0823e3
SHA13c8543e1c6681bd944e514982bc45d633ad339f3
SHA256064e38fa5d8dd700a870326e8eef504f8b09efad8963e5451eb0f7c67c18c7f4
SHA5125024bb7cac796d9e0d52d15f2f3f0997933c80c2813cf6b4173a4a4fabe25f2e7b506cc4744f8e7b628482a9fea26373858cd50978b0d9054d9e742312ef63b1
-
Filesize
5KB
MD5478875fe4316783f007a730fa3dc637a
SHA1fd5e955c78e7533d618ebf914722afea5b059dbc
SHA2567f9ef6cff9e71d3fe340391d3c449ee6918cabc4ba407f44066ee6e9dbdd224d
SHA512f13f0f78609aeec2fb9d2920f02693ba7396afba542ac02906ab905f1d4a7ab80882ed398b3c14fb66e1fae889e9e694269386c115cfa2caec3eb163311cdb1c
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57352b64308bb3610f642292286b6bd11
SHA140f0453ad2201e532d6881de9b82f476d4775cb3
SHA25697f822f2ec23250f1aa3487c1c6738101c4a36dc65df57e14fd08d19fc7141e5
SHA5126bb7ac70b2921772e0d7155069a7d0f977916cd770e04baf984eafb17c372e769ff9bd5b6ff7ebe5bbafa72987e8ea012876d9ed66dd4d7ad53c565a6a83cb98
-
Filesize
10KB
MD50ffce33f3ab3ddd6bd697fc4f29b6dc0
SHA15ec135a2387a13d7ec4ac7b6f5f1ef4a05ed5a79
SHA256d667094394d1ab01419e9abdf6e4223bdfa2c66e254ce9278fce3f4e62d26c2a
SHA5121160b8d4276cacf70f9df2a195b52ba42afa03057f54da9633feef29a0ad56f3187b4a93bed093c5fd0ea4296838761b74a87d274f151adecbd5cb918f2a519e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e