Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/06/2024, 23:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://snip.ly/3iygbb
Resource
win11-20240426-en
General
-
Target
https://snip.ly/3iygbb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3856 msedge.exe 3856 msedge.exe 2100 identity_helper.exe 2100 identity_helper.exe 4976 msedge.exe 4976 msedge.exe 796 msedge.exe 796 msedge.exe 796 msedge.exe 796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 1484 3856 msedge.exe 78 PID 3856 wrote to memory of 1484 3856 msedge.exe 78 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3304 3856 msedge.exe 79 PID 3856 wrote to memory of 3124 3856 msedge.exe 80 PID 3856 wrote to memory of 3124 3856 msedge.exe 80 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81 PID 3856 wrote to memory of 2972 3856 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://snip.ly/3iygbb1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffad2853cb8,0x7ffad2853cc8,0x7ffad2853cd82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,13797572195257629845,17145877084584707159,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5de47c3995ae35661b0c60c1f1d30f0ab
SHA16634569b803dc681dc068de3a3794053fa68c0ca
SHA2564d063bb78bd4fa86cee3d393dd31a08cab05e3539d31ca9f0a294df754cd00c7
SHA512852a9580564fd4c53a9982ddf36a5679dbdce55d445b979001b4d97d60a9a688e532821403322c88acc42f6b7fa9cc5e964a79cbe142a96cbe0f5612fe1d61cb
-
Filesize
152B
MD5704d4cabea796e63d81497ab24b05379
SHA1b4d01216a6985559bd4b6d193ed1ec0f93b15ff8
SHA2563db2f8ac0fb3889fcf383209199e35ac8380cf1b78714fc5900df247ba324d26
SHA5120f4803b7b7396a29d43d40f971701fd1af12d82f559dcfd25e0ca9cc8868a182acba7b28987142c1f003efd7dd22e474ac4c8f01fe73725b3618a7bf3e77801d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD589816fbd8fef5381ab5afaa0ea420a29
SHA1ac2e823c6c951bf4716cecf3652fa471d196bc46
SHA25613bfb8317581d377b8778a8502adbb665fb81f65dee88570be8dbb2924cf32a6
SHA5125f4f8e4a2c8882f4a129fa05a4e6ebb15df9ad3005c154e8609fc7fb1e75c4910d5d16e53034b4c43863ea90da1dd81c318dcdd1129185cc333cd2365f0fadb6
-
Filesize
540B
MD5049299312396473b034d4eed3f48542d
SHA181a9b0efdfee2bd3d8b1825e49992a07fa1dd6a7
SHA2563f4fc0d7ea7baf51d171e6ace41cf89c0347ae7958fecdace7ba06b439b52030
SHA51218e63556d6cf7ece87b7237f7587bba0c425226cd3915db9783b6e94a96d1029a3cdc4ac8b6bd1651b958bfd1429ffc9c5d858f53858a73d57093e81f2292a1a
-
Filesize
5KB
MD5b772576e247735bdc93e729b771d9d8f
SHA1f9e35f7762162efeb34722616922cff06cc6f0f7
SHA256dd9c89784d8b3ac6c7a7e1450b9357196ae7f21ba5afb6a33bf3e1895c1ef371
SHA512da3051882f4f487d68643d5e684918985b34782bd120d1da3e81157ef9b9280c4090b6c25ae860a9dd9c77bf3f25d71627e72ced888fb7ac6d12b3eb71cca477
-
Filesize
6KB
MD5c03d89a3e869d260d2e247d9e4341de2
SHA1d01f5cf9b6aac086a455bf464bdca6065f9dcea3
SHA2562d3544708dc7676909a9bba98fec0bb31fd9d085308f97b5e97e610f1cc03926
SHA512e923aee2e355831be5134e621e3f448fe2732548ec8829095b2a3b0035ed8de2bda31573634d02fd2fa969082e754b002bd8946259f971f37efe1f14acbafe0c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD591c2324778da267954f17ff5dda859ca
SHA17f03417ec7a3b046d9017c43b2b34daa8a93e5f9
SHA256ef6ba56e037aa7aaee0a66ba5ceb21525d53b27ad2a8c1504094cd2ec674ab81
SHA5120092a233068d13f75cd47e463d002b9b1981ce7e3e9551e96acb832a47901a695afc1fc42c8a548051cd409ca4743553753306c7c299e0216fc318bf3f086aee