Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-05-2024 09:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://events.rdmobile.com/eforce/magic-link/21111159-e328-40e4-93cf-ead1a10e11d6?e=&o=628
Resource
win11-20240426-en
General
-
Target
https://events.rdmobile.com/eforce/magic-link/21111159-e328-40e4-93cf-ead1a10e11d6?e=&o=628
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid process 1344 msedge.exe 1344 msedge.exe 3164 msedge.exe 3164 msedge.exe 2920 identity_helper.exe 2920 identity_helper.exe 1876 msedge.exe 1876 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3164 wrote to memory of 3876 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 3876 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 4408 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1344 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1344 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe PID 3164 wrote to memory of 1200 3164 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://events.rdmobile.com/eforce/magic-link/21111159-e328-40e4-93cf-ead1a10e11d6?e=&o=6281⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffeccd13cb8,0x7ffeccd13cc8,0x7ffeccd13cd82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,4955457848847961632,14375204238093218680,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5500 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5046d49efac191159051a8b2dea884f79
SHA1d0cf8dc3bc6a23bf2395940cefcaad1565234a3a
SHA25600dfb1705076450a45319666801a3a7032fc672675343434cb3d68baccb8e1f7
SHA51246961e0f0e4d7f82b4417e4aac4434e86f2130e92b492b53a194255bd3bba0855069524cd645f910754d4d2dbf3f1dc467bcc997f01dc6b1d8d6028e2d957236
-
Filesize
152B
MD534d22039bc7833a3a27231b8eb834f70
SHA179c4290a2894b0e973d3c4b297fad74ef45607bb
SHA256402defe561006133623c2a4791b2baf90b92d5708151c2bcac6d02d2771cd3d6
SHA512c69ee22d8c52a61e59969aa757d58ab4f32492854fc7116975efc7c6174f5d998cc236bbf15bce330d81e39a026b18e29683b6d69c93d21fea6d14e21460a0a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52f2f37231da9cb36e130c9fa5e1ada13
SHA14fb3ea085346997ca09a306f7ac5b8d169688d39
SHA2569635f3797f5718762de09def004908bca9b446c0f23c6b9e2f397dc923216b90
SHA512a2eeaf7c3a70e7fadcdca22b115615b7d69298cd2df0da8dc2116f617198ba389e3e68465f87fa7aa61c5bef1da3531c83ab21adedff1edecdc4c8104f79d20c
-
Filesize
1KB
MD549200b59039cbc21febbee7e0ab25978
SHA1864c0e7d614392731ba58d012271ecddac48c34d
SHA256f689e492aaf090e86ab6079ea09399a0819bcbf96aac6223c48833b360e3ffff
SHA5129d0282315287c5342e09ad7b6989e147fef6b47eb3a9ff901f65bfed332cfeeb8bedc5e0c89ffdee0743a280d614f756331e9f087f123758aa6980da5a6478d1
-
Filesize
5KB
MD55a64cc461f4e9deee5a1a6e0b97faac4
SHA130ab9a806d01dccc6464e20936b25ad4d0f9354d
SHA25625fb078646768350aa2d1ee096d0127d635d75eb83a09ad7166fb7185fd7fffd
SHA5124f7f058edea36327c92399fb7a9f2d2cfc54bf7072c393353c1a1a9d33cf1a3f930b4093031aa21aa045e1413a7aed9461f99f4843bbfe9ec3e0aa2f21d2d8e9
-
Filesize
6KB
MD5f30ac08454e3eb2bd6eae36e4578d2ca
SHA1a85fd55d85748fac0cd4fae9e28868b29f80300c
SHA256c4f0400cca46205a7ed1b1d1a44057ce69070650852bd8e5fcc82adc0ec4f4f9
SHA512272e19187326f09d0185cf9112e8d6fbf1ce32940f6d50dbda248fb1217280818962bd0277042a87ddb131b3274cafb25a9701b853452f10dda5d912e7bd8114
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD52bb25342bf1402defbc2276584c8e159
SHA101266560d58b7ccd6c47a776216d687c6e1024b9
SHA256f6619c47ec5a5939ec17dc5078977a8094b25d799004031359303473226e9245
SHA5127a96a97bf14966f8dcf80e3650c6af2505fb4bfcf876fe7a30040e44646bbb45f2b583bda8fcbeed4f94e12058afb53637828b57ff801288754a8fa3a72f49e2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e