Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/jaaaaaaaaaaaaaaaaa/im-not-hosting-malware-here/raw/main/j.mp4
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/jaaaaaaaaaaaaaaaaa/im-not-hosting-malware-here/raw/main/j.mp4
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 6112 j.scr -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 17 raw.githubusercontent.com 18 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 876 identity_helper.exe 876 identity_helper.exe 3820 msedge.exe 3820 msedge.exe 6116 msedge.exe 6116 msedge.exe 6116 msedge.exe 6116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1560 1456 msedge.exe 83 PID 1456 wrote to memory of 1560 1456 msedge.exe 83 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 4616 1456 msedge.exe 84 PID 1456 wrote to memory of 1968 1456 msedge.exe 85 PID 1456 wrote to memory of 1968 1456 msedge.exe 85 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86 PID 1456 wrote to memory of 1868 1456 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/jaaaaaaaaaaaaaaaaa/im-not-hosting-malware-here/raw/main/j.mp41⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,4980589133899599185,15096020623668162116,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5736
-
C:\Users\Admin\Downloads\j.scr"C:\Users\Admin\Downloads\j.scr" /S1⤵
- Executes dropped EXE
PID:6112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause >nul2⤵PID:4872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
261B
MD52c2e6472d05e3832905f0ad4a04d21c3
SHA1007edbf35759af62a5b847ab09055e7d9b86ffcc
SHA256283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03
SHA5128c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37
-
Filesize
6KB
MD5593eec1233c5db2814073443e7ede93d
SHA12f6e030bbe4303bd7518f8f312847079b092583e
SHA256f90640959185a21af8ee09817ee7a0c998952c90e1c653a47b190a3988883308
SHA5123f80eb8c04f194dcdac7559184ccc5ecc8dea830730abbbb59866dc3463cb8c834642db13296c7c605f779fcb81d3fd5c982755110edce372f1b8697b4b11a4d
-
Filesize
5KB
MD5d89914eb7f52aa278dd069f330dd687d
SHA13b3785f1adbddb49dc5842fc3cd7792806d1b8a2
SHA256ff4120d464c03991aeb1bfc143a19abaf23b1e1b49b9ba74484707582eb27e68
SHA512021860d9cb68cbc47277d75c273eb6fb808199f23bbd733e20b8addf80e18915bb33b262cae408a43d3a6c84a072c153663fc0dae0955cc6804fdb86f7c6e6d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c9e5982349551ffaa47423d0e89acbed
SHA1e001563d5adc38af0153315ebbaffff5c7ffc638
SHA25635420b4c97a01f7f6cd19c7f3942224612fa7e6e84570ffc3fbf1d462799560a
SHA5123b8a260c6adf7280e5b3a55a2c930550166b8784a9cf61f8e56149802b9c28873e22b480cb7b7cf4d7f7b1922fc25b8f59b6213cb2623c335a632e50a7ca0612
-
Filesize
11KB
MD553c2da2367a7e4f8af6468ef6c25fb0d
SHA1ef032d53bac46671ef26d2f7d260b4b35984f7f6
SHA256fc5d6bb685f0f62db2dae8015bb6e0bb1947efc91a783896f395d1380dba5d7a
SHA5128d4e95b4e3a00712317c4934c831eadee01bfc686bdad35cad454240c01443189a081bb94ebc1ea9d5ab9e7e16377cbded252ebcf472cf3f3689df5c98b55048
-
Filesize
31KB
MD5e67009b9bb1166c960e3e364dc046d2c
SHA10662766fc9bd1d536684c51e4600cf4a45d2ce50
SHA2560298a7d0abef134b9a9e2bbc41b16deba9b2113302f2e13f292f987343e80e0a
SHA5129d0e25cc256dd7e7e399ae9b598b860b0d4d51564c4af93c7971d5c3fddbf9d9d5b51905d8286601be7efe675bb2a402628a131e97c4871d9439a74ed149e1c8