Analysis
-
max time kernel
480s -
max time network
595s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 00:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://free-content.pro/s?tCtE
Resource
win10v2004-20240508-en
General
-
Target
https://free-content.pro/s?tCtE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 3188 msedge.exe 3188 msedge.exe 2996 identity_helper.exe 2996 identity_helper.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 2788 3188 msedge.exe 83 PID 3188 wrote to memory of 2788 3188 msedge.exe 83 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 1832 3188 msedge.exe 85 PID 3188 wrote to memory of 2052 3188 msedge.exe 86 PID 3188 wrote to memory of 2052 3188 msedge.exe 86 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87 PID 3188 wrote to memory of 3908 3188 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://free-content.pro/s?tCtE1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa75c46f8,0x7fffa75c4708,0x7fffa75c47182⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11135266876745244089,9439058083389951112,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\06b60de6-0271-4146-b311-182a14c0e5a2.tmp
Filesize1KB
MD5171cceb8203b6a06037842f6781af9f4
SHA1baadd63573e90cc8e2b0941a984ee6b66f5f08cc
SHA2562ce5a7528035a0dbf178647691ff26e8c32a22a6c85b496ce5f288f2ab779a0b
SHA512fe30f368deb081686dfa4b2fba449802de954711176fa7e42779dbd9f61f187db6bd7d2ac1d71e52ebe4480e24dd0e4705c3f8297e60583bdef0711b4749ce93
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5aeb7ef2c00ac8a37581a2cc7e2a801ef
SHA149b347d4eade87b0f95c8573ba95dd314d48bd2a
SHA256df09ae250a7413065ecae9c56b2a4a6785675dfa418af9a333c89b33065e09bc
SHA51287c5a7cdbcb4b2523d7d758f393d0d387bfb85bb7d0a133fbf7fe5b9e7ead9d3f8994d98ceb1a8950aac5b8dc6bd881232d69012daf31c1411203599d5cf755e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5b82fa4e5d5c63f817e13c840543f9feb
SHA16bdc06eb1ec6c427a73712935e1e659adfdcd8df
SHA2567db07af3989ba2ff496f3230a5ebacd54e0ddde188c42980dfa9b0d93e3f681d
SHA512edabc92e51d0626aa367011ebc892bda6a44d6cb83d2fda95d537f487845ed8f2b9bdddc7e216092e4191018b3a35ca31f8546bd02abf07843e20b1df817b528
-
Filesize
6KB
MD5df7767407d315bc5bb3d84fd19d02a81
SHA12c7cdede7732a1364f43f4a3398e6f55abf3693d
SHA256a728f50f3cdc02f88550b390caa04ce0b99b93479eb334d11835b0d555533039
SHA5124d8a46624b8c542e8bce48c13cbdefd0e572dcb9c1a51313e7a37ac85d33475a0a349e6e9ac9e6a8b4d2626978f7a151921e537e121d8524c6251fadbad1abf0
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD54e321cf04af5fa5e3f39dd0e87ddbc87
SHA1d94a464a5ad3c5313cbfee89a0e54b0f615db647
SHA256a0b89c387a6de7f333199dd2dfc1d5a82791fb4af99c69bc95f58dda124f8963
SHA5125b53ecefe57fb9c124250ef274328e2f336dbee8bae19c632505bd9735b58b02b0d980478cca58ab4d42f8e5f6e6bf17bbdd89481ffb2c302ba1f9127947d8cf