Analysis
-
max time kernel
66s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 03:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcommunnittly.com/gift/activation/feor37565hFh6dse
Resource
win10v2004-20240426-en
General
-
Target
https://steamcommunnittly.com/gift/activation/feor37565hFh6dse
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 1016 msedge.exe 1016 msedge.exe 4316 msedge.exe 4316 msedge.exe 1944 identity_helper.exe 1944 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4316 wrote to memory of 4504 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 4504 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2192 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1016 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 1016 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe PID 4316 wrote to memory of 2040 4316 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunnittly.com/gift/activation/feor37565hFh6dse1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f93d46f8,0x7ff8f93d4708,0x7ff8f93d47182⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1832 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12332468872686523991,17065760651760860645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6123b974-39c3-4992-9b9a-4f62927bc0c1.tmp
Filesize5KB
MD503bb986ca152151b31664bd5c164b489
SHA17813a91eb02ff18c6efa9bf4bd935057098990c5
SHA256816d571aa9be20d60d3299df67ee38114956e67f4af911e45794363c7a59c8fb
SHA512961ad08152ea90d0439e83b462db856468afbac4b987cc0aa8061677eaa6e6b0c6a089796fbbf5562c09c6313cbfe86b205dd50ed79c57e3b52c31af8d862a90
-
Filesize
119KB
MD557613e143ff3dae10f282e84a066de28
SHA188756cc8c6db645b5f20aa17b14feefb4411c25f
SHA25619b8db163bcc51732457efa40911b4a422f297ff3cd566467d87eab93cef0c14
SHA51294f045e71b9276944609ca69fc4b8704e4447f9b0fc2b80789cc012235895c50ef9ecb781a3ed901a0c989bed26caa37d4d4a9baffcce2cb19606dbb16a17176
-
Filesize
121KB
MD52d64caa5ecbf5e42cbb766ca4d85e90e
SHA1147420abceb4a7fd7e486dddcfe68cda7ebb3a18
SHA256045b433f94502cfa873a39e72d616c73ec1b4c567b7ee0f847f442651683791f
SHA512c96556ec57dac504919e806c7df536c4f86892b8525739289b2f2dbbf475de883a4824069dbdd4bb1770dd484f321563a00892e6c79d48818a4b95406bf1af96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD56af7336e5d92916269ee9a16871fc159
SHA1d5fca2c2d6ae6b6d56cd0c4377b51058192f09a2
SHA2565705db7ba05027bf5b456295de89af925da5d62c0cb39bf3d54b70f6c6f49106
SHA5125ab9560f8a0cb83fa55cee714293100bd7ba1e0870b04da9f37ff4dec63bbc4ff65a26c3daaccd841481cd5609a51fc872ad1087d0125fd3f4ce26ed435d2f4c
-
Filesize
6KB
MD5a998a2f5793b0d02a722a7a1de3c2d5e
SHA13e9f936c6ea2ab6e3f356a9437acdfd99a1397e3
SHA2563805cb0995261a921542726ed04cd30d71e33514f9aba7e0337c545fdc6b9902
SHA51230d2ed0a1ec2ca2ee9d8d3949080e2c008f246f7c4a84c79948ee6a48cd37dff85eeb4ecec117952f4fa019d1bc67c7b3f8399f9b53108772049a70ce9a36a58
-
Filesize
6KB
MD56b1ff0ff97d86168e70e0cd98b1de4b8
SHA1e9eece3219b34622b35af697fb74ca1f9a8b6cf4
SHA2564c09f1dc656333acdfab6e5372a3f6309afd6fde0f50af7d5611dc1f468cbc2f
SHA512a315c8d6576f3e966a0f6629e52eafd86c47863aa929b72394f5ea3bdea941c672a3141a4a1a5d9f28836a0ca3dce0c28fcd74b4069375c1d0d6c0cb46140578
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55a7bd9cc58e7764d8ee525b1eaf1c058
SHA19f28c646be08f56b826c25966287182550e90932
SHA25679cad56ff47a7e78f193eaa21663fdf9b2f555fd6135f21267ef593c6adfaa14
SHA5121babec50117f03c42e1b1489c8652d9d2f909dafc3ad0ab6c6a6b84412e23b04378eee9504298099ae78d518961f8b5e050d308767c8a6a659a01eb56cd961be
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e