Analysis
-
max time kernel
46s -
max time network
48s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
31-05-2024 17:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://alturl.com/29qo6
Resource
win11-20240426-en
General
-
Target
http://alturl.com/29qo6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 1876 msedge.exe 1876 msedge.exe 3096 msedge.exe 3096 msedge.exe 3200 msedge.exe 3200 msedge.exe 3944 identity_helper.exe 3944 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3096 wrote to memory of 8 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 8 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4528 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 1876 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 1876 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe PID 3096 wrote to memory of 4656 3096 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://alturl.com/29qo61⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc0b5d3cb8,0x7ffc0b5d3cc8,0x7ffc0b5d3cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1948 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,12919931553025369542,13139371002583160044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD51e4ed4a50489e7fc6c3ce17686a7cd94
SHA1eac4e98e46efc880605a23a632e68e2c778613e7
SHA256fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a
SHA5125c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD58ff8bdd04a2da5ef5d4b6a687da23156
SHA1247873c114f3cc780c3adb0f844fc0bb2b440b6d
SHA25609b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae
SHA5125633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD569f360ebac50e7a6e200d2bfa3f14038
SHA17fc118ab4dd37873c92292b7550f584693735992
SHA256c4c26656b4f4a61c356df07c7247c7664a80ca39a3e47b6f80bdd2ad51158679
SHA5125a4eb79ed5ab8ef61ce8be5ed10435f65d2dde7994bcdec34553884a5c5a5f575c64af01e021ecb6d355e8fcf301b3a33e6a894829ec76d188096f128d98ade2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD587f9d3af344dfe8d73cb5598c0b1a8c9
SHA1892edc0fc3ddfacca35ba2f04458a0079552de87
SHA25623d381b041206cf2d872737ad7841713b1fb7f202228cbd597389408aaf5d419
SHA512937ba37068062a2e0b97385e33661d5667dacd8c0813b25b1b4c02b4fd835355e490ad27da4aa863685601dd6b03ecacf85fc90fbf1a32dbba4641db3eb4f581
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD50c38c9f1c02732115e82d779b7411704
SHA17c30bb5832bc0e5c782afb37355554e048c105e5
SHA2562228f0f3e7a45a4494763eace8a527b7cfdf8249f873dc18213ec13e3a181d98
SHA5126082d89513fe976600e35e9fcd27082e139daff75ea454a4cfb4132b88b9beb3276e23f39bfa62bc80411f977cc7cb19210555b6920e9dbfdd5dd1b69712660f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD59355afcaf167201fb3375370bf43d9aa
SHA1c7d96d9af510dedb407b644a473437b3ca9195b7
SHA25646c79dc0f37ab9ee46ecb48c1a0cb63e22fd48fd307bba667151eef77bd7e635
SHA512c58e499ed5654f57c0de02b68e73b761cd6dfc55ee1cb84d07b931b39a333a7906e47f7efd96e7f4aa4705d3e44ef07e21cf3e83af1ee71b470ed73a233f278c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5ec7090342158fd143a045948b977aa18
SHA1b0f2b2603ab73b45f0504d64fcfbff32828541e3
SHA2565594560730539ca9aa5aa38eeecb8445f2ba663589ecd9606e5d293bbffc3cfd
SHA512728b87fff180f408402d461dd4e45aafd54aa45641ce427b8130c6a8a84fdb079bc42c158d4c62e3a21f7cec7e2daade09a0da4f6bb77fc124eef7daa3695997
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD5dacfeb2db4db73c155b3ddaabc948200
SHA1ea48505f83713d3d43600727a296bdd23dae78cd
SHA256e56505868f0c8587e6f5198c93f413e40eb70090d753f205b208187f8f20241f
SHA512ce93ea8b3c157e446103be8d540e553f3c583b1e6dd0c8c2bfac46b371eae017258d7a42264e2d80e5a240d49258297175d34b7a8687406c0c4d4b4229d48e52
-
\??\pipe\LOCAL\crashpad_3096_IVHTORRAUNKZGNPIMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e