Resubmissions
Analysis
-
max time kernel
1767s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/06/2024, 07:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://best-links.org/s?Mzeb
Resource
win11-20240426-en
General
-
Target
https://best-links.org/s?Mzeb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3292 msedge.exe 3292 msedge.exe 1532 msedge.exe 1532 msedge.exe 780 identity_helper.exe 780 identity_helper.exe 412 msedge.exe 412 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 4380 1532 msedge.exe 78 PID 1532 wrote to memory of 4380 1532 msedge.exe 78 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 2360 1532 msedge.exe 79 PID 1532 wrote to memory of 3292 1532 msedge.exe 80 PID 1532 wrote to memory of 3292 1532 msedge.exe 80 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81 PID 1532 wrote to memory of 5112 1532 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://best-links.org/s?Mzeb1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff30433cb8,0x7fff30433cc8,0x7fff30433cd82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,3862511693284111918,17195088311910915536,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2528 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5de47c3995ae35661b0c60c1f1d30f0ab
SHA16634569b803dc681dc068de3a3794053fa68c0ca
SHA2564d063bb78bd4fa86cee3d393dd31a08cab05e3539d31ca9f0a294df754cd00c7
SHA512852a9580564fd4c53a9982ddf36a5679dbdce55d445b979001b4d97d60a9a688e532821403322c88acc42f6b7fa9cc5e964a79cbe142a96cbe0f5612fe1d61cb
-
Filesize
152B
MD5704d4cabea796e63d81497ab24b05379
SHA1b4d01216a6985559bd4b6d193ed1ec0f93b15ff8
SHA2563db2f8ac0fb3889fcf383209199e35ac8380cf1b78714fc5900df247ba324d26
SHA5120f4803b7b7396a29d43d40f971701fd1af12d82f559dcfd25e0ca9cc8868a182acba7b28987142c1f003efd7dd22e474ac4c8f01fe73725b3618a7bf3e77801d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5cd94482605a0a06571641ba8588377fa
SHA189d45e7aeb117c9dc1990180d406fbfaeca2d10a
SHA2567d917d882618bb885bfd1cd0b72e2bff8073468c778fe5c8a659daf9824e7a23
SHA51264d499cb01f6df900e53cbf0cdf067d5d623539c83b7ce9708507e43985e943ce3a64c28b112dffc3b2e1168551885a68b133c7d78cbde10578afa5fbcf13da2
-
Filesize
1KB
MD5bc6c4aab06b1fe3f8b9077aef7471760
SHA1b50a0bd55dc53eb747c705e88c675a5b2463a541
SHA256f93e1d3dd2b9d2a9a64718e9c679670eae7ac7c3b37a1ff390752d1c4477d4e9
SHA512b7501695908321621811de003d4eb179ca90aaf45f960232195ec028a09f07abdefdb6cb4175db556a36a58c7ae27d8c16341d558956691535b9f05d7f2b6662
-
Filesize
1KB
MD599066e22c41d66c6dbf9629bb948b211
SHA12265852f3ad54cf60769ad5af539831d94fb3b6a
SHA25657314c1c16e4a432affd7913d98096473acb96e5917e03f3facbd35c2019ab89
SHA5122df4947ead0c8a6c70cbeaf4bd7587386cbb99da7998f57ae88868458acf3b9deca2db40fce87b3106dbef4ebe724c6f185eeeb0a8dd4351fe012b136b4a44a3
-
Filesize
5KB
MD5e2b07a92c9e0c453a9d92873eb46bdfc
SHA16b3461b29d3d8fe6e79775c53f3bad06c9741b91
SHA2564596ffe12ba7464b7905dd8d0ef7ea7abdcc8c11d4e9305c8d9edaf08c366758
SHA5127474a432c7a9cf65a06c2203ddce678b5aaf8982e0dca7728dad71f4fc00a03e7317414bdd3bc4af94a01ae5526558c69a77ee488abee9d731d268c14e825397
-
Filesize
6KB
MD5b75495b699a751a07d2281e75f1b90d1
SHA1e7cbbf56925a05049d776302f72d91ce77e77d42
SHA25622a89288de81750ed354ec2753bb812d504e6fe9fd50140c503e431637778bbd
SHA512a5bb59c8a45633ad75829c177c4c63b433ad9a1163bddff7e370532768c836fb58149289e9ec38802e39fcdeb257d1365216d931e1407f4ddf271ed93ff84d57
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5413baf12f34d48280eff31dd985bf6c6
SHA1e7cc4591f243a044809ef9f82ba6f8d60ce66eeb
SHA25627b5bcf617702f5d1414742c18c3a697cc565ce457ffa1d872f677ac78e53d11
SHA512bd432a2be2e45b7143aa164e11ecbcf94085ac2089276a316075f58ee62253bbae0ab45e3e162aa0e662f01d0db12f58bc5415b95da107519f4d39c57502c2a5