Analysis
-
max time kernel
19s -
max time network
26s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
free-updated-free-fortnite-v-bucks-generator-working-in-2024-get-fortnite-codes-full-list.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
free-updated-free-fortnite-v-bucks-generator-working-in-2024-get-fortnite-codes-full-list.html
Resource
win10v2004-20240611-en
General
-
Target
free-updated-free-fortnite-v-bucks-generator-working-in-2024-get-fortnite-codes-full-list.html
-
Size
140KB
-
MD5
f124e2ce47b0817336ad89edcdbac598
-
SHA1
cb9823b8349467d5fd24ae339cf054e880577184
-
SHA256
5500b748395291eef0a8d5ebdbcd2ebc5cf79ecabcdac89edc31e13fe0e92d12
-
SHA512
5e78c1d455985c0ddcf6a0242406a1102795ad2478780479304352ad3e7a30fb2b262a5b39411db95f60db233057cab766e7333a3d884d56d209f9b3ee2b40ea
-
SSDEEP
1536:dGutKtxtwoLxv3oIU6zM/JommfyrcocWDzDPHEjfEDMJarCSob5IHTrkrblLtHyX:ltKtxtJLJ8jDPPA5RhM7bZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 1320 msedge.exe 1320 msedge.exe 2632 identity_helper.exe 2632 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 744 1320 msedge.exe 82 PID 1320 wrote to memory of 744 1320 msedge.exe 82 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 4496 1320 msedge.exe 83 PID 1320 wrote to memory of 5076 1320 msedge.exe 84 PID 1320 wrote to memory of 5076 1320 msedge.exe 84 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85 PID 1320 wrote to memory of 3624 1320 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\free-updated-free-fortnite-v-bucks-generator-working-in-2024-get-fortnite-codes-full-list.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffe706746f8,0x7ffe70674708,0x7ffe706747182⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,6560293995614705589,9692203147430468426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:60
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\file__0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\file__0.indexeddb.leveldb\LOG.old
Filesize362B
MD509aaaeca1183c71bf61151cd1a2823f8
SHA1bc728d3a85966a64f5d56c65d550096d7e080eb2
SHA256fc5353efb13c9b825222557f2d6802cab7053e79aca2ec8f7d50c2145cf0a587
SHA512d7b9ee1efc78ab56c6ca50a2b07e0335cec9827bf4333df6d5e2fa57a6cb5ce76cab9d8101102168100329edc16dd6ffbbc03a1a55e87db1f3b75b59a2b8b792
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\file__0.indexeddb.leveldb\LOG.old
Filesize359B
MD58ddd88059005d9a53f036b6870664c55
SHA1b0ac4b9c37b728e27a27a078cc242f6d99543380
SHA2560ccb83a28d15ebd186fc46e216d5c3f87540366cfe212fb6f2a9b7b18d515d6b
SHA512ce6dc70647082ff729f707bfe69925f866c05ee200c6fd6a0f489ccbbdda053315f615a1d6e0a49b16066a2075c97d0662c8a8bf9268b7e7a2ea54c9b620860a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\file__0.indexeddb.leveldb\LOG.old~RFe5768dc.TMP
Filesize319B
MD529aaa5e2cf490253bce530b20f27f64a
SHA1b6038cb51c649c5c243dbf31edb3917d3a87b3c3
SHA256a4d699134d27c80d6d82dfbff405b418a5290e672e213bd4fad4f506fb286557
SHA512987dc16931421602f0719f9b0e2c26393cb4e6d038d942078bf2cd476a788ae30d6b72e6eab57a115e1766585c521b5eb43b8fa0cd73c4b8642e5ee70aea8e89
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\file__0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
6KB
MD54d6e8e627c979bd7157c185db13f792c
SHA19ab2b4d1a0b03b5cc7f20d7f844efd222856a06c
SHA256ddcd5627bf358001e89d8c216ab576e15a0019c560e2714e8fa8517debba8715
SHA512407d26595ad913865ce3f3474beb2b06613146d43253ee74c61d831abe717393850dadc711fa6d1eb2e821d12d33cdda26a1f20e9a14cd283f54d33e5332fc3b
-
Filesize
6KB
MD59b000b307a01d48abf20530c2094bd33
SHA1cc8b301992998cbc2f1bc18eaf0c866655ea148e
SHA25655ae597d622a29eac8dc24a83f0371804d84fae20b06d2d35ead97b061328a32
SHA512ed2bf605e675f06d38b81ab04ea679f3c94b7ca279391af90c37bd994eafc00949f6b520b265f2475a62b7f5cf1ff84f09d8d91685021234b68cf46ccb1cce1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD546ca1650844355ebdff5ad87a2f62120
SHA1d19b7b4c7ab8874cdcfcf8a1b52fccfa7f50e7bb
SHA256b15d6604a9031f1a0d29968cf1c5e2e40c7fe29d673494bb6652c9b8ede05b76
SHA512a92cdae3691f38e236470a320b77f4e9ebc59a8f7f129fc97a7785c967b5081ad20677562e6fc2452a136ed663613961c436a3298c0ea30cbbace1978e2508c9