Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 19:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/folder/xc7wuguvn411j/cheat
Resource
win10v2004-20240508-en
General
-
Target
https://www.mediafire.com/folder/xc7wuguvn411j/cheat
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 2128 msedge.exe 2128 msedge.exe 1756 identity_helper.exe 1756 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 840 2128 msedge.exe 82 PID 2128 wrote to memory of 840 2128 msedge.exe 82 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4416 2128 msedge.exe 83 PID 2128 wrote to memory of 4060 2128 msedge.exe 84 PID 2128 wrote to memory of 4060 2128 msedge.exe 84 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85 PID 2128 wrote to memory of 628 2128 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/folder/xc7wuguvn411j/cheat1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d9546f8,0x7ff97d954708,0x7ff97d9547182⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9880291510154629434,5373812568300387669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:3008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD534c20b869de851b69fd6ae6a317db067
SHA1dffe304b16c757cb2b3bf8a3986df006c3c5c308
SHA25652f6b7edff1dcb367d702c81c60787734ecbff4ae0dd05973182614f7cec9dc5
SHA5120d7fa8a8d7877e6003ce0e13140f72f083020a3415e943f398a96b7035479d91149094206c9069432dcaa799b9e828587e84ff8d0bd1d7c7a07fcc21121c6a4b
-
Filesize
6KB
MD5904a0415dcd226c17731aa51febf766a
SHA102ebd14a849772e281aef987a37e66cdcb17c481
SHA256cac17627d328c5d676ee28d5504c8a5feb2eff87c27870ceeb77c649e8c147ea
SHA5125ba5f535b6e6b09dd50abb207a8370210c3770c8eea32e60b82503c1c1c30ce34121a9628a54006c4cbea8099893ed7b564ff2448840848ad9218b1a97ea4abc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD56055af851eeb63d529a550eb39a53334
SHA11e8be2a978b72adf2c7b0ea616d062de15e43c45
SHA2568702226b4f58bd722482d3975f586ce7759582bc5f41e579eff3f3a6ece60dc7
SHA512fa9f3e27b1615d5d6b6c27988d936b06ff5107db4d34418429ef6d1a2e300d1ba96dfb9ffeb8a13a4b94dac5bfda98231e479d129ea2a3d949b0a0d0d560a323