Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-es -
resource tags
arch:x64arch:x86image:win10v2004-20240426-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
02/06/2024, 18:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.reddit.com%2Fr%2FSKIBIDITOILETFANBASE%2Fcomments%2F17m7crv%2Ftitan_tv_man%2F&psig=AOvVaw3QhP2ozRQMbnlSHxDCcTVm&ust=1717436971664000&source=images&cd=vfe&opi=89978449&ved=0CBIQjRxqFwoTCLCTn8e9vYYDFQAAAAAdAAAAABAR
Resource
win10v2004-20240426-es
General
-
Target
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.reddit.com%2Fr%2FSKIBIDITOILETFANBASE%2Fcomments%2F17m7crv%2Ftitan_tv_man%2F&psig=AOvVaw3QhP2ozRQMbnlSHxDCcTVm&ust=1717436971664000&source=images&cd=vfe&opi=89978449&ved=0CBIQjRxqFwoTCLCTn8e9vYYDFQAAAAAdAAAAABAR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 4196 msedge.exe 4196 msedge.exe 3096 identity_helper.exe 3096 identity_helper.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 2040 4196 msedge.exe 81 PID 4196 wrote to memory of 2040 4196 msedge.exe 81 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 3504 4196 msedge.exe 82 PID 4196 wrote to memory of 4204 4196 msedge.exe 83 PID 4196 wrote to memory of 4204 4196 msedge.exe 83 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84 PID 4196 wrote to memory of 996 4196 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.reddit.com%2Fr%2FSKIBIDITOILETFANBASE%2Fcomments%2F17m7crv%2Ftitan_tv_man%2F&psig=AOvVaw3QhP2ozRQMbnlSHxDCcTVm&ust=1717436971664000&source=images&cd=vfe&opi=89978449&ved=0CBIQjRxqFwoTCLCTn8e9vYYDFQAAAAAdAAAAABAR1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93e6046f8,0x7ff93e604708,0x7ff93e6047182⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11731922226025368390,15495180418155213058,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
491B
MD5829bc1d263ec11d438b4a50a7090b245
SHA1408f2f3eaabec293b6a94d0b4857950a33c65b35
SHA256745560decff82eae2c0a3c13473910c83507eb2d6c8c1acf19cb0747b6a0c91f
SHA5128acde999f2adb3da1eea1abf296b09a5c4f5d6eb385b3ff65aa65f3bfb4c28215f53fbe2cd3c1b48a9111d31166a6c3be3135a2bd04007d047251ee932782f44
-
Filesize
5KB
MD5e4b208edd283e4b966e8eaaa0d3a263c
SHA17a5e8c57be57a4bdf00c12c8e7a97568a967aaef
SHA256bedf091d2b830718f577c7e7a5910e56a2292c21764d2e5f6a91893d4f92d92f
SHA51272b015f03e634d3b8573cbfb9fd00c4efc7bd8f3038c49ce50c498728536feb353c5c3280ed2c9ca79701032ee92a63d4185b3aae334d71e4800c68798f98fb6
-
Filesize
6KB
MD574f8cba027a7ac8a07ccf4886e55a19a
SHA14e53b60ac17686d89ee0926fd8daedc955fe45cf
SHA2566ea647d13c2020cdaea94254f815875b4b6cc78386ce581222ba1bfa0642d297
SHA51223bc7e42be9d98a2a3f9c05d8e76954c758361b81d2521d9dd0d23c043012e0de1674ed3396e9e81d5fc3ad4ca141b1809bad9a6cc2ee040dbceca2b9168bdba
-
Filesize
538B
MD51ceeef726de3834c76e10b7ec0bd2122
SHA1f21ff87ea60c001a7fac498744a46d7b3e7275c7
SHA25663048287df929ceeb27fb3a3bea29b0fa234de33d124162aa63e744869080b49
SHA5120e1c284895cac776c8df320eefbc68674155e747cfcc2e1be9954cb5c5598c930758a5c548f19344faafd3fa5030f7c08796bbbf9236ff80f2912e2dbb99f9be
-
Filesize
538B
MD523b88e1dea7bcd3d6de423c3490f444d
SHA1d73d07a23070b980e5281f2081188d3e34b33b81
SHA256ac00673f1879f7d7b658caf79c0b701753a279dfa1bb2fc26e25fd66896a7c9b
SHA512aa6773df6bbf226679de3428ca07521738f7381c836bee0dcb4b71994d0922ed1faaf17da671bba0a4a8049b704727dfe81f25f2121dcbd89b32e01c8856551d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c11fc34d26e24f8a98fb3a7ea30f10bd
SHA190a21c0073b72ac1565b1c8520f19df32fb9f0e4
SHA25627e5451f819fd395a369494a4fd7f5f549aa03e92792c9f80402c70e2806b2ac
SHA512f12ba3792efd9a9817658dd0dc6b96ea55aaa18906b0db6ffadfa4f284c12a5f62cce4f6849146bcbbae2e5a536ccb4787d7ff333994543af92843c0cc17b7e1