Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 19:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bit.ly/3IORujk
Resource
win10v2004-20240412-en
General
-
Target
http://bit.ly/3IORujk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 5048 msedge.exe 5048 msedge.exe 5220 identity_helper.exe 5220 identity_helper.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2964 5048 msedge.exe 86 PID 5048 wrote to memory of 2964 5048 msedge.exe 86 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 2880 5048 msedge.exe 87 PID 5048 wrote to memory of 4856 5048 msedge.exe 88 PID 5048 wrote to memory of 4856 5048 msedge.exe 88 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89 PID 5048 wrote to memory of 1796 5048 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bit.ly/3IORujk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84ef546f8,0x7ff84ef54708,0x7ff84ef547182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4743452928677469313,4312413453877252287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
Filesize
768B
MD5e219d56d8dedbe65fa22836ade1854e8
SHA188659f36d8c878060622bea19b188a5f10c4a5de
SHA256289f9b85fe1e1817f478e1cbd57c04c0f6cf40487ef1708c6577dd630d956005
SHA51271468a5b45fb8ac7a5ae2bdf14c95677902243b44ee176b035f3e0c286a66989b0a0d04974c296e59bd40386d0ea9c379149445839847ffd21de92262b869ae2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_15win.com_0.indexeddb.blob\1\00\9
Filesize136KB
MD5597bf520b6afd655c77137a2f0a92510
SHA198398287deccfc05488d3d1122b79fef676a3924
SHA256619f3d045156babd4ec232d30d39d44443eae7c8c113a26c864ddb88a02f1515
SHA51201f6b5a0ca14c1ee9c8998e0fb45399c617cdd34f7e459ec784ae963e731be5cbbcfc28b7293fb31462c0173cd9b155e78b3080454e88bcc2e98d04b5ee2bb8a
-
Filesize
750B
MD535df338bdd3391990b91636d19495c4b
SHA11d55c298154f5c733a50a80d47df97306a39f218
SHA256e627505790a512ff74b930aa9bdabd62af9df45a9df27fd105c4137a99855916
SHA51225fa0c85ebfcad28eb215dcd35108233b6f9b20d9f28fa69ac20437dd77ed0677e88ed58a4e85982b8a209c2fb71cca324b9ff2e5c5cfaacd082eca61ea7f4ee
-
Filesize
6KB
MD54002c0df156e87fe0d5b71b3e6b13bf2
SHA1fb313bcc09e6963a6f5397bb6d5c459d96050e0e
SHA256610b0825b473b61e06f16810d8292aca678694da3da86ca03e212ed27feb7be8
SHA5121d939a3d992c7c393476d0785fe7096161d107c8893631513e82d62fbfe1095d82a6df8f5f3619f4e56c4c30154c5455273ea8e2bc417faf3d27ff8a18f250e2
-
Filesize
7KB
MD5d61dfb3bb4fe86abf8dd31493941a33e
SHA1420f93ea18b422659857e434582a9982efb0a3da
SHA2567d0f4f385393993fd5d88695ac14321ee7685a713c626568f63304260c93949b
SHA512b37b77a2ce7c7b21d3dbf6c021ce7927290f215055877bc0139c8ba8ea306a309c781d1a9e3fb85cf704cb43a5b8a6732b516240c83ee0aa8e8451cb8a930e3a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5c23a9d017ef3b50b53c92826fef30f24
SHA18623831c7d1094401b5a0e3957002c3af0d886b3
SHA256807108c25e1ee0d175a6e40fa55b68eff022a828dfc5d31ce283c6ad987f8596
SHA51216f283654f8177e96a4cc2d63e17577847008c1f21a927d2ae4fa33a4ce0c2311ed04d0af02530c3913e5c56ef735b3527d5247a1efab549862c80f3bb4e22d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe579431.TMP
Filesize48B
MD5295b8427b5dd9f269e18fcd69bce7c34
SHA1de65d9fec7ff450a38810b8848e5659650b8d2d7
SHA2562b4e4e9f8aff5ea1216cc530ecb108aa702715f48db579a56266a3a43d5060d9
SHA512db4fba9dc45d7cdba45b802882fb9ceb6a25c41dc3fad7e93bf27e1bef61ba77bbaf6ee4e8a7f840c3cf688b802a6533b2d672362f97525c7a0c506d4bd73e9c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5464bb1071c91cfbbfc2da6ba2471ae84
SHA14d48d9730a44d2c7a6f17977d747529864ffa081
SHA2562857a52334f9dac947adb31cac40a8d04eb082584e2ffac248e77f7b4e92ae9b
SHA512ae62279aa218a1740e01be45f3bd965dcd0bf2bfabed99a5dda9282eb771d8eb47cc4057e23819ef04f0788cfa11559caaf42404c66a32f4787c12b05c3619ed