Analysis
-
max time kernel
1721s -
max time network
1765s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 06:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/ef3bf397-db77-47f8-a4ad-9a2b08ca8c5b
Resource
win10v2004-20240508-en
General
-
Target
https://mega.nz/ef3bf397-db77-47f8-a4ad-9a2b08ca8c5b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 4736 msedge.exe 4736 msedge.exe 4184 identity_helper.exe 4184 identity_helper.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1164 4736 msedge.exe 82 PID 4736 wrote to memory of 1164 4736 msedge.exe 82 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 1904 4736 msedge.exe 83 PID 4736 wrote to memory of 3416 4736 msedge.exe 84 PID 4736 wrote to memory of 3416 4736 msedge.exe 84 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85 PID 4736 wrote to memory of 1424 4736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/ef3bf397-db77-47f8-a4ad-9a2b08ca8c5b1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcab8046f8,0x7ffcab804708,0x7ffcab8047182⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15071504453504227735,4760147022436985047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD51506c8d1a32b1d9a735e6828dbf40c8b
SHA1942362dd4f2cb3589be78b834584ef8fd5956415
SHA256a6a6489295b04d0aff69f919476a3ef83849a8041d683d440b7c730b020aec5a
SHA512411798499a9ee8c6f4993246132e58908a7b311eac3d19260252cb153964685d09a52d85e8dbaf2cab62efa0ed5f0a487e7319f158e156e8fb1e7d1a4ed9dbae
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD587823b728b6673d6958ec153daa81dbe
SHA1a5130c4c511f1908aa2886787d9948605df34905
SHA256591aafcffac62e42e415298a6bc6c0c7354fc30fe384db2c1c938ad5ac7d2bcb
SHA512435552cf866a0979dd289f7752bc3fc58ae10b78c03dcfb8496e1e2f976f450bde341a851c4018f5c1279ba5edb5517c421782fe0774c46e052f92c8ada6e2fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
6KB
MD5051ddc7b9be626917aa727a5c6eae069
SHA1a623a2ca86cccee26c28c8f30810069c24f2503b
SHA256f5c34d0ab56aab44ebfcabfd7418f75ff2dedd4cacaf4e87f94f664907d8f000
SHA51252ad4e7bf3509a5e5eba37ec49b9308228bb3085cd1edcdaee5d0e460935c761a088521d8a374bf024a3daca1096204d7b61c0cd3f16c0140ca1c12298802609
-
Filesize
6KB
MD50f419147b16ba5d8b11cf02d45ab9cbd
SHA1263db786396df7bd07477e807a83c8095c3a41ca
SHA25685a9c3282656e15b486b374e8de44b6fcf407ad2e353759bae99504b7aed5dba
SHA5123d68ca32af5c23bd4819e2a110f49b009f8afc5ca54b4eb512be2d061956f37715c093584eeee997dd874ec1136f692dbabe985c41a91cd41579801187b4efa9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD507ba4bb3a52f2c6fecdd33a03aa8f9e9
SHA1a664ab7b17fa873943316d3dddfb4ef107b2bd7e
SHA25618fecc5fa394fd0a998e8c0e5f4b0fcc78788f29454a2265a586aa4ba717ad94
SHA5122fa1edaaefbcaf38095c6fdcc441155ef685ce1267457f221c293e92e5989cb6ba79aed5968fc80ba4462561021d9bea87367bb6134dc5fd7a83d9dfd1420a70
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe579b65.TMP
Filesize48B
MD54e501e05286af36a50c66c74044d9aba
SHA1953134e8a6cfb4ad62cf2cde4720a9fba6c421af
SHA256a3fb4e8542c1310ff41202a523eacfdfe9259abe4acec27a81883872d17f7f31
SHA51295b6996085182e3ed9a737cf9125e2416387ea656344b4147e6cf60fabe326fc42c600c6605b9e2fd991d3f03088c79d0754c7e079db96352c8fe1cc41fa3173
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145