Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 03:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bit.ly/3UxBE3o
Resource
win10v2004-20240412-en
General
-
Target
http://bit.ly/3UxBE3o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 2100 msedge.exe 2100 msedge.exe 1896 identity_helper.exe 1896 identity_helper.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1424 2100 msedge.exe 86 PID 2100 wrote to memory of 1424 2100 msedge.exe 86 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 2468 2100 msedge.exe 87 PID 2100 wrote to memory of 3240 2100 msedge.exe 88 PID 2100 wrote to memory of 3240 2100 msedge.exe 88 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89 PID 2100 wrote to memory of 920 2100 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bit.ly/3UxBE3o1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fff4f9d46f8,0x7fff4f9d4708,0x7fff4f9d47182⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2292303399440100766,14767577374662147122,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\82a84b9b-354c-4f41-b5d9-6ce7995e133a.tmp
Filesize6KB
MD5db36f7527fa8678ec3e53341b2c80367
SHA1d73460689793c8ee6caadd0e3bdb2204179541e9
SHA2562cab075874a858542a29710c63cc48dc6500f164211e410a3451a9ca23f6d796
SHA512f7599553441fffbd636699516fc0b1d991b69454cb9e13918cd893ef4aef922cfaa7d7df36c66627eb271514e7d1ea402d3f5ac312449b31fbb8b39a4e43739d
-
Filesize
261B
MD5a87596d138653a5064baaa0845c08233
SHA1d8f0c70ebfeccdadfce98365827c1079dc56ce9d
SHA256db1f46ba02788504bf4a249ecf12537172f5f5223b6be5f4bc94775937eff20f
SHA51296fd58072ace051e1ea9c7b21e68ba70c5eeca97807031c92e4b4da78738baf0feefc470645932450b77d2926ccfd9ba8e363f97c5b0d661ed73d6d3d879c163
-
Filesize
6KB
MD5aeba5ce90aa9910aaf9b2f37303a5d07
SHA1e7a024832a1966582df5a021893b15425f786415
SHA256f9a3ed04cb4d46245076f6a271997850984561622a8ec8abcf02c77e8ab6fd61
SHA512b0a1fc352b568d9a061d7d012ac0b4b85619bb797af5c02520a99ca63d42dd9a8b40b791f3de243f0f34bf462492f58c3dc58d310572a9254f4d89eca1f11448
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a57a8113c5af12a256540b1ee262860d
SHA125fdeb866176348af25d2119e3547c75b8e67192
SHA256ae9a96ca3af1e7e4db7a0a57faafa374d9e5412d752f83bce3b1c0c23e82a88c
SHA5124ba52e3857bcb751f378f30b7de4014404fdbbb12887a8c736bbca7602bee6c7976aa7f6ee41362427aea415507e9a6234d149d591b4dcc280c16def4a412213