Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 14:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/haxnetting/Discord-Boost-Tools/blob/main/Opera%20Promo%20Redemeer/main.exe
Resource
win10v2004-20240426-en
General
-
Target
https://github.com/haxnetting/Discord-Boost-Tools/blob/main/Opera%20Promo%20Redemeer/main.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3988 main.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 49 raw.githubusercontent.com 50 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 414921.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 388 msedge.exe 388 msedge.exe 5032 identity_helper.exe 5032 identity_helper.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 2068 388 msedge.exe 81 PID 388 wrote to memory of 2068 388 msedge.exe 81 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 4672 388 msedge.exe 82 PID 388 wrote to memory of 1612 388 msedge.exe 83 PID 388 wrote to memory of 1612 388 msedge.exe 83 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84 PID 388 wrote to memory of 928 388 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/haxnetting/Discord-Boost-Tools/blob/main/Opera%20Promo%20Redemeer/main.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd92e046f8,0x7ffd92e04708,0x7ffd92e047182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6232 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1494842352845219665,15340646018374256273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6304 /prefetch:12⤵PID:5204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3284
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3116
-
C:\Users\Admin\Downloads\main.exe"C:\Users\Admin\Downloads\main.exe"1⤵
- Executes dropped EXE
PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD537e9534842073804ae276e59f1a66651
SHA152a260852e9bcc3ea649deaa9a920bd897cfbfc4
SHA256a3804c198fb05cf0ce9121e2ecb712ac6c8d8f2828480e266a5060eae227d86b
SHA5125593c1dc0447e7224ddd467e656cd6b241a4647121bd7247b09f8e3a6540a28b7e50d98f6bbb96d3365d46992cbb0817db193c7ffe6854d9dfcdb25c8616eb62
-
Filesize
5KB
MD522bb0a0c1417ebbdb91cf56a98681ee9
SHA1ffd05848e9fa558f2baab3cda8abc93a19fbf9fa
SHA256df2742b0af902be652df7b95cfb489fe0d8b23f32cf7a0392b98c1a1f8886dca
SHA51215c9ccf3beb5e9bedff8c7804cf3ae778f539ee06cb83f6bc055348e2ab12f7580d7b143e505cb27c219c7df390cc50bbf240fe7e91c64f8fba9f974e6a80082
-
Filesize
6KB
MD5101b947fa2f56b4ef1a8f6d63082c5f7
SHA185842870eb7a452c3e90847c972ad7493cd72c74
SHA2564380154667b57d1e1de0520a22253dc22f7bdaf12068a02912ee3125e8504fe2
SHA5125af2b237b6e606c989585331505deb2cb5d139bc39570b94e931263e18d835785108f25fa1fc1996919c712b2787da5509c57b448421bec3c06aa46e96c741a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54afa983b1fe9c54aa87fcebc0123fa03
SHA1679b83728f86f6e9412683a81b28a30d5fc2112e
SHA256ec7cad678ac9ef76813e9f5d7bf4532990c0d7e588ddd446d34e0579380e0d1c
SHA5125d9be6739113f56486fb5bac106f8e0ab664c35f8b10692c41789ec205ae87172accf1f1b0e584b0c8a26b873d4075a9a36ec80e4c2698275e8bdfbb3fe784c8
-
Filesize
10KB
MD519e382cff0d9c4fe72a56b44fb9f7c2f
SHA1d4d7aee602e062fc166f6003948609123da0f86b
SHA256cebe331c70438c0c84c2595280bab2b881c2a658724c488479770ab431e1bae6
SHA5126db0bb131e66394b800aef47188f38f9c13ae2294ed3de498cd061d5595e83a0c81a8df54b18e6b59a5f1b68dda1553b2dfbb3cae41aa80cbbff40e7d4a2a222
-
Filesize
6.9MB
MD54ec27044f51c3d0576a16ce7ac35b7b8
SHA174894f89b5dc3d882fb9ec75897df7d07ce5b52c
SHA2560f3baac9f45c3923206359e45748223c86aa6dc873c8eae52bc292a67ff1a217
SHA5127432145feed00ea9f737952d797bd9007cf903e8435f6555dce11881e499cd5cce53d34825378ee2950f4820b2763dfa9ba05766f832be932c1bddb6f42ea341