Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 17:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sc.link/Ttapd
Resource
win10v2004-20240412-en
General
-
Target
https://sc.link/Ttapd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 1504 msedge.exe 1504 msedge.exe 1372 msedge.exe 1372 msedge.exe 2988 identity_helper.exe 2988 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1372 wrote to memory of 2984 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2984 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 2352 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 1504 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 1504 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe PID 1372 wrote to memory of 4192 1372 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://sc.link/Ttapd1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9872f46f8,0x7ff9872f4708,0x7ff9872f47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4409225585699290960,11791354390803843865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
816B
MD5b970cb863792cad0921184ab2a8f3ba2
SHA13c30cf5e5f663072cab0260dd8488c6f2b08aacd
SHA256417600a9f619c1d26b2aea6d89e6d2a08000e5491045f8436dd30bd05ba51647
SHA512aae4d9dd0b7f2ce436eb1df2ea5e68d95a55706efb927ece37073321b0399f4edebd41a7f8d01f416fde0e267bba0c8122098a46c0b79ee9abc71734469fcc7f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD55c25858db11b4f49fba5a9122ac542d6
SHA166e9b1e92f79e7f08ef83facedad7302e59d53e3
SHA25651d68f7154837acf0a4c7e216cb371bb807ff0c12c9e0d50203cbd2c8ec3dd0b
SHA5121a8c4493bd5d85e0833cbda0af0e9db4598406e302783b698e88c288b65afc8ab5adadfb82febc900413861946f824593385cf73b49c2968658527371ef24784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD549882b9e5429f6fc10f817839b42b15d
SHA1a67c9c926ee14c0ece962f984f31442942fdad74
SHA256027e35a4499f71e6448293a036baf34cdd4035e4bb74eeee17e2b7173a5cd478
SHA5124aa41f92af5e4f9ea82cb46585263f6a609d3d601716efe071c1617c4d7763944d9b98c10e8b806113faeb44f12d6ea2fb140c144f16772eccb9907f3d8b3f9b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD57c53a386901935f238c578764baf18f9
SHA121dc49c4a0c7c7afe18f68601d15017b488d7c4a
SHA256b59dc291d04a6b50c017a4fc2953e4c7894291064ae460ac3a0b4c4443a1f791
SHA51209a2c50cf9b8b762f75a85765479c1868dbfa7f4e06b31e75a21ae4d48b81a59a430b7ef6aaa17c2383b530df9739dcce84139ff53fb68a593757478ff9f2e35
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5f3f87008fbb5f2ab6d233481d3adec52
SHA1fa01fa9555bf7346e945ce5397265ecc94b35112
SHA256d4ed4d8ebb6cda4ba26c36c0cc5077892529cd29ff42389ef26fec709ce9b58a
SHA5128dba977313ff1e8dad7665c515b3a2d3ece48ecdb96587a04da26eba9caabe988b1b0b66cdb1e2babce23121561758ca626b6c281ad25fa00b80647881928b53
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5420fde8eb3f54353b3a3adfbda0c5a09
SHA1e74e9053bc5c97086fd5269f75dc0e12d59ce721
SHA256b1cd1b1796c7aa7efb4353096be5fbd9afe7e2585b4cccf5d8dfa0c490914bab
SHA512017ec70df56d47c4ecc0f718217ca186c0bddb0ac27bdb145140cf3eb21aed684ca5c360fbeba738c878c90e3e8f8815252c3257edd8840602ed5c3cc0981757
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5931ea331c90d8ba98694abace73cb2cf
SHA112fc03e8bd59996d7a98414b3334d315cb6f3a0d
SHA25630a7129e98f7c0752717eb4c2a6245b7aa595c71bbd4fc63f048a07f59d5385a
SHA5126b6ab163caa5394b9c796106df45847c93abcdd289039f1e3e2f82be7f3a6171b278fa3a0da6ea2facc0cb4a67adb3622ce9511ce5f7828ea81d8795e1800e38
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD545642d5b4bb12d3fced67c5f0532175b
SHA14b649f1dad333284c85443a4b216f1f1b28f5660
SHA256dd3e4b3bc94c0ba8ac2374084452141319966f54498d3d5e348a6aff067517e9
SHA512ddca34fb238ca97bd1fb0bd225318c8c2efd2a0e7e65ed716f1eea86a849fb5b2703b33d5ae7e5420f53912ab391da90fd4f8da80861c4b581b53fa1f62cc6df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5814de09202903b79eed96f4f7520219e
SHA1c625bb147448e75fb248ac7e828cb455cd56e176
SHA256aa1bfdb0c08434169ea79b3de8d2a730559c36c41fd7daab4248255a49eb95b9
SHA51250868ae4913ae94513a74e5ebc597cc27fbd842d630dbb184144515cb87cddd5531e2fe1a0d8e88ce2b5255e4b66b78d5246e9abcb8d9252a4645254044bc4f0
-
\??\pipe\LOCAL\crashpad_1372_EYRFVMLYVOBIWUIYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e