Analysis
-
max time kernel
480s -
max time network
592s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 14:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/zMkzmQzT#P-i3DViG3TqsVulkJNFTuUvsdUULaU4F5zODdO0TQXg
Resource
win10v2004-20240426-en
General
-
Target
https://mega.nz/file/zMkzmQzT#P-i3DViG3TqsVulkJNFTuUvsdUULaU4F5zODdO0TQXg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 1560 msedge.exe 1560 msedge.exe 4188 identity_helper.exe 4188 identity_helper.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4596 1560 msedge.exe 83 PID 1560 wrote to memory of 4596 1560 msedge.exe 83 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1968 1560 msedge.exe 84 PID 1560 wrote to memory of 1872 1560 msedge.exe 85 PID 1560 wrote to memory of 1872 1560 msedge.exe 85 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86 PID 1560 wrote to memory of 1768 1560 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/zMkzmQzT#P-i3DViG3TqsVulkJNFTuUvsdUULaU4F5zODdO0TQXg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14270220394846775399,4629061182604245636,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD508a623c18b5b31f83f9395958f98a9dc
SHA117f4380fec60f59cd28846a9a94831bab5a3e61a
SHA256be554e351a276f58f4cafc42dfcd38faa9c3d84422d0d97de5f3a8130b4b4c91
SHA512c48bf607b8f9fa2634954ed7863989e535709e792e8fd2ad6cf0bf037865c7cd0b15516587f6cfa432fb3bc22f325fe8cbb8607d71551d2834270d2334df2cf2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
6KB
MD5921c1ee8769c8d6e8e71b8427d7173cc
SHA1bbbf26a9cd4a969318e3552b07e44b1c53d07216
SHA2565a126352ad0e02234fc1dd60aeb6d58e756852dc05fa520ed6ca2eb955b10422
SHA512f020b3d0b46e4d49e2662d6acfd6b483fda489471f3a8bc8feef3019f8252e8d2130ee1fc7f647398349e6b484ab61909c33460557a951892005079dee03759e
-
Filesize
5KB
MD5413094feab21a6cdafc9b39b3a22678f
SHA127f8e1e84ef833195849f9ee2e513dc33d71e3da
SHA256cece59017495b8b5fd11f5c607ce87dbc2a610d8a2edf5994a67a49ba27667ee
SHA512d7f6ed6d5619278a10a8892abae078c1d7224ecf08ffdd0bff0733700a6362d5b709dd8c607cff4b70f75eb51d7b7819570b2e0b3106b7afdff5c19363eebdbd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD58f9041f016ffdbeb8a777a09ee24bb88
SHA17342ebdc8a1123c0de809ff1c6a9b08f3bc693ba
SHA256d013e964e718b23f95a2438522f318eaae3c2ce67ecd955ae72b1bc1304c98f2
SHA512d07234b5a85a563bf5c1aae41b22cdc42e9c4d268af2f0328f523d7d23ddcb451b9b3ae0a1defe9de7b5eaaa40f23131c86f6620fe2e64789c3c9b3869685b3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ad38.TMP
Filesize48B
MD58811ce84b08c392b89e0ef095ecd2719
SHA15836462ee737cefdb3fadf0157394d407248535b
SHA25670a2e90a9c6f20eeeb3b983b44f10a1f24c96e67018643e71407e3300669fc97
SHA512d863c16b6efe68f0b490b8af9fc070f58ed5d71277330a790f0418532ffebfd13a0e45a9fc757fc0c8b68cc0009b6768a5ca79f7130dba7ac37749408f663779
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f3c3e322b66e64d3e852491c19c278c9
SHA1dfd7f35f33eb20baa96290464fa196d7785d52a5
SHA256f1dc23ed4042345d5c249d663744a1c3c7cea5217c571c0611dab58342e34cc9
SHA512bddf31c9ae65560e54ad0cdf6981a61cc3dab33da56876d55681ffba665b2fac829363768866bccaaffb89ac63125e02b8bd08e3076fa97b3a14cb57854f80cd