Analysis
-
max time kernel
1765s -
max time network
1699s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 14:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=comments&redir_token=QUFFLUhqblpsR3ZLT2d6NVMwUmMzTmRaWDlnclNvVFhxUXxBQ3Jtc0tuX0pZTTdjOGpJejBhZDFvT3VXUE9ISXZXcmhGUmNMVHRKVEFidFhvYVBDZG5fd1lSWENsNGRyOTdENU5rS1lQNkFpVkVpV3ZzRG9wQXBjQ0F1SFdlV2VTcEhkQk44eThaTHFYNDFqUHJOX3JUc0V0OA&q=https%3A%2F%2Fwww.mediafire.com%2Ffile%2Fjbo8vxu8ay2tbdd%2F2FA_Bypass.zip%2Ffile
Resource
win11-20240412-en
General
-
Target
https://www.youtube.com/redirect?event=comments&redir_token=QUFFLUhqblpsR3ZLT2d6NVMwUmMzTmRaWDlnclNvVFhxUXxBQ3Jtc0tuX0pZTTdjOGpJejBhZDFvT3VXUE9ISXZXcmhGUmNMVHRKVEFidFhvYVBDZG5fd1lSWENsNGRyOTdENU5rS1lQNkFpVkVpV3ZzRG9wQXBjQ0F1SFdlV2VTcEhkQk44eThaTHFYNDFqUHJOX3JUc0V0OA&q=https%3A%2F%2Fwww.mediafire.com%2Ffile%2Fjbo8vxu8ay2tbdd%2F2FA_Bypass.zip%2Ffile
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 2744 msedge.exe 2744 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe 3972 msedge.exe 3972 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2148 2744 msedge.exe 81 PID 2744 wrote to memory of 2148 2744 msedge.exe 81 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 2708 2744 msedge.exe 82 PID 2744 wrote to memory of 5064 2744 msedge.exe 83 PID 2744 wrote to memory of 5064 2744 msedge.exe 83 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84 PID 2744 wrote to memory of 4312 2744 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/redirect?event=comments&redir_token=QUFFLUhqblpsR3ZLT2d6NVMwUmMzTmRaWDlnclNvVFhxUXxBQ3Jtc0tuX0pZTTdjOGpJejBhZDFvT3VXUE9ISXZXcmhGUmNMVHRKVEFidFhvYVBDZG5fd1lSWENsNGRyOTdENU5rS1lQNkFpVkVpV3ZzRG9wQXBjQ0F1SFdlV2VTcEhkQk44eThaTHFYNDFqUHJOX3JUc0V0OA&q=https%3A%2F%2Fwww.mediafire.com%2Ffile%2Fjbo8vxu8ay2tbdd%2F2FA_Bypass.zip%2Ffile1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbd6073cb8,0x7ffbd6073cc8,0x7ffbd6073cd82⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,12046716498930335413,4815988893833700602,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db6f3e04e8d0e847b83d778e43552540
SHA16f58849131e27b05ba16d1e001fcab3db510af9a
SHA25674058d1dab7f6c19b598835bdc3050a9b8afa46b17095cc5bed4687ac2384948
SHA512b12bc4a12511611d35e426d17a0bc3e99f3045ad7246deacb4fd50aa74f5e2da3f336c972b52a8a48821f1fdc3f85ed12666f54ed1e11a61e23926285014bc1a
-
Filesize
152B
MD5dc3fe6b634c77522eec8ca4b8d4434ea
SHA1f8da22ca5d5f4788078f5ed52f7f12baef619b4b
SHA2560fe3ee7f209b5350c0876b6dc7c571c2af5db80964e37835b6e7279cd311d31a
SHA512c5cc2251985ae5aec6082a8a4e4dea1f1a8bf72c4ccf199ad4a3e17509a4f7152ae60b1bf84d77e843e4d7043bd2f0da63d620cbdb8ededa94fa4606d016ec69
-
Filesize
588B
MD5fcbf403b969bc5881623c74baeda08f8
SHA17a932e4c297cf051a4b75a9865a0666bce3b82d4
SHA256264a81b62640a77536b5fc3d356b43c74331a4dfa4b8328cbc1cb90da67bc6c1
SHA512c7e62c878689939b52eb989f0e6444364e53abb5f86a61b70840eacca873cff79ce1d3959506a70b0e0bdb70f578786dd145b926379368c0b7c693db4f8ab78a
-
Filesize
5KB
MD55f20cb4815f3358d4408e1a9797d5da0
SHA1c025dd86eb52bc1e7d9ab9d051b0b079757f53b6
SHA256b41a489c1d87ced404ca0404abb2b902803c29d727132aeccbf376dc8ac40a89
SHA51203e9770279a5f5a7c937c020bcf67999dbbbc00c0a0d52907d93ec0b9f43e424c32104cdeb37108435980068b64db4fe2f0543531ad8b3094082c0805c673afb
-
Filesize
6KB
MD54f553ca57fadd9debba79c4868e097aa
SHA1591aaab481701fa112a8fe8158d9ccf98963c7f7
SHA2565adc3e88c6e868db2a56da54eaf9975d3b3d0e1f67c0101b542ad1a1054a965c
SHA512d4869a6d2f08219065d0667e4d12dcea5dad7607199e611950a20b606e960bf3ec0f444826f5f1586d9efc80ae127dcec4b56d833b8ac40df94832cac7f792ab
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58a54c7703dc7545f8749620f2cbd4496
SHA16bec00435e7ffe4cc297580bc791ea90b496b4db
SHA25639aa08e67d1dba08a1a7df292f56e5642b2d7774af8f8561ad7fb6ededc81d3a
SHA5129514345a8ce047551e614afe64ffd51eac2bba045d16d95fbeebdbc9f2e74f27b800d40afd2a221d52d9534b7cba0ce71a15023c96695440777f9ee2a67220d3