Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 18:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://particle.tf2workshop.art
Resource
win10v2004-20240419-en
General
-
Target
https://particle.tf2workshop.art
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 1408 msedge.exe 1408 msedge.exe 2956 identity_helper.exe 2956 identity_helper.exe 5736 msedge.exe 5736 msedge.exe 5736 msedge.exe 5736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 3552 1408 msedge.exe 83 PID 1408 wrote to memory of 3552 1408 msedge.exe 83 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 4448 1408 msedge.exe 84 PID 1408 wrote to memory of 3192 1408 msedge.exe 85 PID 1408 wrote to memory of 3192 1408 msedge.exe 85 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86 PID 1408 wrote to memory of 544 1408 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://particle.tf2workshop.art1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92e6e46f8,0x7ff92e6e4708,0x7ff92e6e47182⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2688 /prefetch:12⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11513005825451256856,2551497289406026565,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x33c 0x3cc1⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5bc7eaab5d42e2a1a8067236aa646f45b
SHA1fcbeef5e0062cdab2e4c4e8022cf0b7967ed3966
SHA2561380d093a6e52ce9fc3ac72a182e3a4cb6623ca3251fbbd032aa78e1a4c91ff7
SHA5125f50e11460da5d6d45336cbe9e24578c5f0d8fb7c06bdd6d7bcea9b9b56f3a1250ff4ec140b797229c595224bd362b928fd387c02d6c316ab799cde068ceea3e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD576789512806bbc7890565a16c203a738
SHA1d746cb226dd1d6d7fd4421f1c919a3cac9b3c389
SHA256534a7d33b439509c13b350024044a39c6311d12efa81c25274d9d2053b6da22a
SHA512a338a4970a4e9f006cf665afa6632ef09daa72ba1fc43df622b94769aa690fdb8b9a7aec6dd7aa8eca4f406534f17b309672ae7c25c3c8a2104d47f6a0fe1ecb
-
Filesize
422B
MD5aac21480b711425e8fb0e4463f683847
SHA1b98919c9a4d48b0b7a08ba4fec59fcf68ba49f93
SHA2561ce3dddd920c61cce0598cbc9a6dae9015fc078e91bfff7aca4725bcc85a13c1
SHA5123598011bec2d742d17304a3fa2b10c5f364a5af252f76f63c8c84fb80ef22bc3e87e2ba1c61944450cb4f4606a6e869d88f8d2cec1a9e53424b7db768e2e5c54
-
Filesize
6KB
MD5ce5f1ccea162715d92831f3afa963c06
SHA1628ef4805db66cfcbbcdd16a31c6e1383e2a803b
SHA2564f39ed5c1896c96981b72c633b15c3596946d8191c0ffa88e39b1b339128bc6f
SHA51271d6133f3ca897f5d668f6ff5983b129f8581412739c0b2ccb9633e905c570eec5192a305386b4aba8408f6681b8be30b4506f358dff0295fe63dde5895e1a5e
-
Filesize
6KB
MD53ad3cd1ad370426213830e5abbd431e7
SHA11876228ed0cbca2417905dd71907d99f3df5c095
SHA2564554777730e3e2ab61c50e28f36ad885f0c723e27fb786ae917cac08b8d35f19
SHA512e5eafa80826bcd344501f0fd6048428910fc9dc91455f8c038678869a187ce727196149fd67ded66b4e306ab6396da0367b458b979b34e4bd32480f9a735609a
-
Filesize
5KB
MD55ebd10f4f9d8369cbdf0766bd5100a4a
SHA1a8ff20fab8c82d5cdd9899c6ed46d4d4f830a3ee
SHA2567680825c63738b131c7e0825264244b08c948eddf70591da17bbd3588efc987f
SHA5125d83b759ebed09bf6c53b29be0a0a45bd751e09362e1a3fafc6c5574b6149217ef950bebc99659bc535a3f945f359458604706334220131f73cc6dea4ddad2ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f11df73b347e33867f7d94c54ca35b43
SHA1c882537a725eeeaad6ac1b4da578e648948c221c
SHA25652f7e5fa4e3e40e4d41998757c9c30b5527f418ca0fe7bf10047a9b4f1a341ed
SHA5128e05f7cdef10489591544053e829056015ebcd38f9e58352062596b917fcc043f52a8a2e4befb0b8aeb9c1c19b3774116018a3738d40cd78bb0ceecbb133a5d5