Analysis
-
max time kernel
70s -
max time network
64s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-06-2024 19:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mega.nz/file/XOwTGYBT#vlxooOF9y_Hf_BwJ4ntSFKn25HnsZ69kSPWBoWlK-Ls
Resource
win11-20240611-en
General
-
Target
http://mega.nz/file/XOwTGYBT#vlxooOF9y_Hf_BwJ4ntSFKn25HnsZ69kSPWBoWlK-Ls
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 644 msedge.exe 644 msedge.exe 3308 msedge.exe 3308 msedge.exe 2720 msedge.exe 2720 msedge.exe 4000 identity_helper.exe 4000 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3040 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3040 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 1016 3308 msedge.exe 79 PID 3308 wrote to memory of 1016 3308 msedge.exe 79 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 4952 3308 msedge.exe 80 PID 3308 wrote to memory of 644 3308 msedge.exe 81 PID 3308 wrote to memory of 644 3308 msedge.exe 81 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82 PID 3308 wrote to memory of 3304 3308 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://mega.nz/file/XOwTGYBT#vlxooOF9y_Hf_BwJ4ntSFKn25HnsZ69kSPWBoWlK-Ls1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffecfc73cb8,0x7ffecfc73cc8,0x7ffecfc73cd82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,16381165900893473072,4587077290485787306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004DC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53066a8b5ee69aa68f709bdfbb468b242
SHA1a591d71a96bf512bd2cfe17233f368e48790a401
SHA25676f6f3fcef4b1d989542e7c742ff73810c24158ac4e086cbd54f13b430cc4434
SHA512ad4d30c7be9466a797943230cb9f2ca98f76bf0f907728a0fa5526de1ed23cd5cf81b130ee402f7b3bb5de1e303b049d2867d98cf2039b5d8cb177d7a410b257
-
Filesize
152B
MD55c4605aed5013f25a162a5054965829c
SHA14cec67cbc5ec1139df172dbc7a51fe38943360cf
SHA2565c16c584cda1f348a7030e9cab6e9db9e8e47a283dd19879f8bb6d75e170827f
SHA512bf2a5602fde0de143f9df334249fef2e36af7abeda389376a20d7613e9ccad59f2ca0447576ac1ed60ecf6ab1526c37e68c4614d79ae15c53e1774d325b4036f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD51345a88cb07b8c3aa91877d1f4e538c2
SHA106fb032488bc3cdd88c85a836e867a8027d1dee9
SHA25613339583f9f260f30a805912f170bff43364ac0ebae8ad604d183b79191d2ccd
SHA51214e1ec74eb267fbf2cc25be9b114531d0def6f9be0bf7d8cf31a7b281a950c722ef6e6ed947340f8b4b6761ccaa914402f314114f55d4a2f0868ab3d2de30c64
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
5KB
MD565da6e770b228de6bf8b6d9e764cc997
SHA1127826ea6d6d1caf281b63025c247d79702ee3e0
SHA256fc1283fe3977e1874360d686b7243a85f68a5d790be93e242ba6b05f39287778
SHA512f5a40bec65799a722fc48d645efd2dfbde54d8ef1e6ae8ee8090f412508e175c278e8bcd96cfb4410fdfb90dc5baea90194868d723064b2fe92d5faddb8a0b2f
-
Filesize
6KB
MD535a922a239779112b4226ac8252b781d
SHA16fe5e1d2d6f7e814458821f428c04497f83d5b52
SHA256ef35ca69941ca9047b1b5fbee7699c5dd7268e45bd26e1e9c945bf56385f6881
SHA512f36e299bbc2afca1a62c135cd21d29a6f664cda90df893aa97f04008c4f6b1bfe862ee8feb211710ae7daef924c5ebe3c5261ba77b95b2177842c811bd6fe283
-
Filesize
6KB
MD5d74bafde0e3ac3f73a058430ee872a88
SHA1b032dfe9b9eece43e4f7b8d19e08ce2baec3cfcb
SHA2566698259ecae150e13542d6ba7189cc76ccfe610a4ac977a151be1b2ed18f4795
SHA512090b3f393efa75d900edecc270e01a7f7acc993b7f2c846089ccc96cb5df947aa5fa1c340ebd09972e34a3d0ecb458fb45fe8e7c8ab5e5845539db3c55045915
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD54a988359cdc4360391938c875de54783
SHA1b9059ca6e009ec2c3424d200b88fc76274bca731
SHA2567a3ed89f0c02c347ae9120cad35a3472ad5434a281f45d749f5b768695d1a78a
SHA5127fb9f892030c58e5b0cf020056b4461918409b8c221355df8ac336e9d9c49ede3c0ec3d1aa560e15d0cc8e82215ffc770273f7ba942dbc3c855cec8285557cc8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c63e.TMP
Filesize48B
MD53fcd95eed0dedf42859d752b6cd4206b
SHA1e9f2320ac12fec180dd04623dff18611e38d1f4a
SHA256cbc0427fc7ea9946803bc700e4539aab980dc7ad345ecd3058f769d8dda11797
SHA512af3cad7da479e458b87fceadc89f4142a38c4b886a5d2d2630681513826e7af957944e2b42daf903b0cb8654fdafdc4153989f28bf2091b4f49f2e536119ad40
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54d1c7bc45b35d9b2f64aae62aca782e6
SHA1e1bb427dff8aa4ab9c63d00e51485046cb20bd0c
SHA25657ddb0e72b79bc1bdabee818b2d27d8d5f96140f0b0457fca574eabe30059684
SHA51215de4e8531a58e5524e6170fdf2bdd52bfe5ec5bea0e179f702d926c57ade456cc355c70f4cab6b67f272720ff93498395daad30c993dea98ce70b7fee30969e