Analysis
-
max time kernel
1760s -
max time network
1686s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2024, 19:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://byxatab.com/games/torrent_igry/gog/kingdom-come-deliverance-gog-2018-pc-licenzija/37-1-0-1559
Resource
win10v2004-20240226-en
General
-
Target
https://byxatab.com/games/torrent_igry/gog/kingdom-come-deliverance-gog-2018-pc-licenzija/37-1-0-1559
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 3256 identity_helper.exe 3256 identity_helper.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe 1548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1548 wrote to memory of 5052 1548 msedge.exe 84 PID 1548 wrote to memory of 5052 1548 msedge.exe 84 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 864 1548 msedge.exe 85 PID 1548 wrote to memory of 4320 1548 msedge.exe 86 PID 1548 wrote to memory of 4320 1548 msedge.exe 86 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87 PID 1548 wrote to memory of 648 1548 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://byxatab.com/games/torrent_igry/gog/kingdom-come-deliverance-gog-2018-pc-licenzija/37-1-0-15591⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb45046f8,0x7ffdb4504708,0x7ffdb45047182⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,4282574837406923055,3160535812396526489,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD56a97ac5c1f3ad85932e170e9f7c04d58
SHA11a068ce981621c9658078b8d5640156a49267f5e
SHA256de34dd1768d6d0a32ff346de40a9d7cf13da1751a63df0d9964d07c5a963d23a
SHA5122d655eaa1fd97083ba7ded8a778148ec69780c2dfbb029e9225fbe7d0a0b7ab634e460be8b8355fd9714975e1236c35b45fcff4677e7a4d71eac4d6446bf802f
-
Filesize
2KB
MD5ff6f137c5ec55fe287c28270c73421d3
SHA106de76c1c6abe6a52a608a481bce775ccd5e1934
SHA2562fa978d906fa3032b3f0def839ed2650e9f3f6b455c22f1d2ab08ce9d8e36eb1
SHA512791a88c177dbee81ad838ffbd5f559555658242da9a6e0e92e2f486f1f43b3f43b7514b83c66e1c5224daf9cf587f6c6b3db4a0a6167ccd4d6d1a9833a29605c
-
Filesize
2KB
MD5e0871088a40fbb3a31ac225791beabae
SHA1c39bdade291fb71653b3a227bd17d465298e58ee
SHA256973c39705117b4918baf5353090f20907494c453b265f250bb7b0d411dea9007
SHA51209c26f073a2230cd3710a1661bd48b56f4f588a83eb5c8e1739ee91509660eea8f9ef3765805d8bd955c7874f4c538c9f5ed26d29fece6a0f09333328894e081
-
Filesize
2KB
MD5d0538e81efb7a9406aabf06e0d51baa6
SHA1b0070a53fdc36ca2184d0d53ea77e46bec17c14d
SHA256d5c1b5210778b0cad9ba0fb5dfbc7c2333fcd15b4b31736a27bea260ac0303b9
SHA512a16cd8c961a1dae4969edb7013f1372f607d77e9530c74bd4043eda0cef2285b289b43824e06d392ba61bd56b0a232de427a8cc887f5a898790e8752de57c19f
-
Filesize
2KB
MD56ba9a82d2d9273dd3702edf750461e0f
SHA1570acb0ebd9519d2a7b2d1300f068d8136674382
SHA2560546640c17c4bd64b5633be3ebbf8ad79666253064b086e12fdc5ea354e16581
SHA512836a1203e9d6255df47e0e4d1de3d072bd3216c240a9180f4ad8a31c9da87e769ffd31689d8e259623a69c5bd06fb52151e037920b38d1d923a0e9faea1e837e
-
Filesize
6KB
MD5563b57bcd14252e6376285dacd2de63c
SHA11c0283a7102dcb6c497f0cdc4ca1537b5e7d0ad3
SHA2566d94f0daaaa2ba268cb6f48f108c3fbca5679c5bceb5c8d6b147be4d7c909a6e
SHA51211649ffd2c31f2eba71de9d35d39242b1df7abffba3b503b32df87729369b627e67c86e29e59dc133cb06169bfda6180bfd1af7c09ceb510bbc9e3a8f72b3579
-
Filesize
7KB
MD5e4677e4853f083b83883f8c8aa183dca
SHA1b53a9b2f4dac0bcd04178aa6b4186735ce0df4ed
SHA256b183ddf56f9ec880ef5a3f7a91421e11024c672338aaed88a5dc9535c0a3764a
SHA51255c4ab228a2fdfb73cabc50ad21d16735dec17f5556d2cd5047a18c8ceea83a9099720684db925eddbedfd5ca403ae11c2b96618ca5947fceb1109e6060515ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53965e09e3ef6bcc0a20bcf6dd4492026
SHA17c1a013bced38948c041966ec95fc5d20f3be863
SHA256b673fc853c9fc1b945b7aa9299c940cecfaec3c964cc0eef555dd5b7b65a80f4
SHA51267cbc51be222eb433a05d703b5677c5142f6ad9864bb81b7ccf1908d6e89c60395eb3363a2945621f63a2f031a34abf0ba44e3e0e78d6823b2234c28d3ea55f3