Analysis
-
max time kernel
480s -
max time network
487s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-05-2024 01:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://rutracker.org/forum/viewtopic.php?t=6397797
Resource
win11-20240508-en
General
-
Target
https://rutracker.org/forum/viewtopic.php?t=6397797
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1156 msedge.exe 1156 msedge.exe 8 msedge.exe 8 msedge.exe 1536 msedge.exe 1536 msedge.exe 3228 identity_helper.exe 3228 identity_helper.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 8 wrote to memory of 228 8 msedge.exe msedge.exe PID 8 wrote to memory of 228 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 4060 8 msedge.exe msedge.exe PID 8 wrote to memory of 1156 8 msedge.exe msedge.exe PID 8 wrote to memory of 1156 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe PID 8 wrote to memory of 2056 8 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://rutracker.org/forum/viewtopic.php?t=63977971⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd3ed73cb8,0x7ffd3ed73cc8,0x7ffd3ed73cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,5147709993103830424,5031251553119796988,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5390187670cb1e0eb022f4f7735263e82
SHA1ea1401ccf6bf54e688a0dc9e6946eae7353b26f1
SHA2563e6c56356d6509a3fd4b2403555be55e251f4a962379b29735c1203e57230947
SHA512602f64d74096d4fb7a23b23374603246d42b17cc854835e3b2f4d464997b73f289a3b40eb690e3ee707829d4ff886865e982f72155d96be6bc00166f44878062
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD58294f1821fd3419c0a42b389d19ecfc6
SHA1cd4982751377c2904a1d3c58e801fa013ea27533
SHA25692a96c9309023c8b9e1396ff41f7d9d3ff8a3687972e76b9ebd70b04e3bf223a
SHA512372d369f7ad1b0e07200d3aa6b2cfce5beafa7a97f63932d4c9b3b01a0e8b7eb39881867f87ded55a9973abea973b2d2c9b6fc4892f81cec644702b9edb1566d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
144B
MD56b0643b388d969897baee279da3119ba
SHA1b1df43dca38b182bd49fdb26c2aa33146636a493
SHA256de49a523cef5e1a28a426fd34193148b844a3f79073b6b67ad048dd2c3be8ee0
SHA51279bbfbe9b9905695625b280546ca7f5b6979257a259e88077816b76d9cddc0bcb66f45d262fbec077e694e19f93fc8c78e2f23a4be1ce3af7fc4a9b135cd8a78
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
419B
MD5e2eefaa7dfd7c01f429d5120604efbc0
SHA12647ccd62ee8facfa45a6dff1777d47bc922a791
SHA256ac38545536019292b7f0b83791c88ab4e9d21d68beda9e0134484d29f7703bb7
SHA512688f4bb2d6140c16011743a8a71db08dd0ffe17b323971781a26d9163ade2263467bc41581407628d893e2b0d1b0972a16b65c4981c5a76369069583a4633faa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5a539a9a61c3add868c76319aa99913f1
SHA1bdd44197a28862690a1737d9d258467121042f9b
SHA256ad3931cf2aef6d071b395e7c0bdf1991d3955ac58039e0e2e9393f4f55266425
SHA5122bec03f13efeb17317de14595fe75fa062a2099be882a79ef0ee5e3b2480ac614fede37251faf7f36c15be4becc2ecc9ed4ed4c477579bcaa4c8ab62a559baeb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5d122e1f6070454d77d2c3ee917203e18
SHA14f4ae9a1926996df84098e2e6e35ced89d951600
SHA2568c26a514c3426c60054fbef13ce08416fd2c5b0318ef2d12c1950bfb9ced0e9e
SHA5123ed060c72adaffc43d15ec28d9a8f19829930b403e40e25eb403e778205ae6fb4fe4a72fa23dabdfe95af27f3aa80b257672b8cf68e304452ab808447f1bb89f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD565ddbc7befada5103cd6b3ddda05a522
SHA149d36972a1245a7d728e70943bd90ba3494c03d9
SHA256b68d73dadf05e9fc9e9eebe84b6b0cf449e9fd016eb942dc84e02b411eab5db1
SHA512e139cf51c93631f5ba2713e48016140cd7e13abf661bbc0f74301ece1569ae382c0bb2b54ce75744d735b2246ae0a52ee8a90e0e314f1ee1fa5410405e3b62c4
-
\??\pipe\LOCAL\crashpad_8_GQJZFHXLHWOLLOCLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e