Analysis
-
max time kernel
158s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 16:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2348.mediafire.com/cijurkjijidgg4bSPy7tzZ4w0ZyYtqXci0rjv9em2OlvlA2Lc9MroAwoOCXJv-au1O4Pi9em5RmVoZd3CHHBDjO12j3lJlbL-XD9RoYlbfOaiQfR3bzqe9rXpEn8RI8BVOalqmmXqJ9Fs7C3q5x2jrS0m9f_F78aGkS7O9pEFVvb/an9wsa4v9lu8opz/thing.zip
Resource
win10v2004-20240611-en
General
-
Target
https://download2348.mediafire.com/cijurkjijidgg4bSPy7tzZ4w0ZyYtqXci0rjv9em2OlvlA2Lc9MroAwoOCXJv-au1O4Pi9em5RmVoZd3CHHBDjO12j3lJlbL-XD9RoYlbfOaiQfR3bzqe9rXpEn8RI8BVOalqmmXqJ9Fs7C3q5x2jrS0m9f_F78aGkS7O9pEFVvb/an9wsa4v9lu8opz/thing.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1316 msedge.exe 1316 msedge.exe 628 identity_helper.exe 628 identity_helper.exe 5252 msedge.exe 5252 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1032 1316 msedge.exe 82 PID 1316 wrote to memory of 1032 1316 msedge.exe 82 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 3940 1316 msedge.exe 83 PID 1316 wrote to memory of 1488 1316 msedge.exe 84 PID 1316 wrote to memory of 1488 1316 msedge.exe 84 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85 PID 1316 wrote to memory of 700 1316 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://download2348.mediafire.com/cijurkjijidgg4bSPy7tzZ4w0ZyYtqXci0rjv9em2OlvlA2Lc9MroAwoOCXJv-au1O4Pi9em5RmVoZd3CHHBDjO12j3lJlbL-XD9RoYlbfOaiQfR3bzqe9rXpEn8RI8BVOalqmmXqJ9Fs7C3q5x2jrS0m9f_F78aGkS7O9pEFVvb/an9wsa4v9lu8opz/thing.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbb9a46f8,0x7ffcbb9a4708,0x7ffcbb9a47182⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2324754356863627858,7120960764639060945,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
5KB
MD518bfef6be7a197637e5c4dd57cc67acf
SHA131c3f1f5c29771b186336d5f7c24d35a43cd322b
SHA256fd91588580a14d4cbfeb9dfdc1d1f298e9067de3d3f2ea40216611ceb397e54b
SHA512f533a81cfc952ae3ddd19a90e13883cbd4fc59a40e981b33ca7323e57b5e7cd7ea4cbbeb826c745a4e9fb1b81489cf3230cf587853056d027340188008dde7a3
-
Filesize
6KB
MD53da7e0384793e2187f942fd796a150d9
SHA1ef6132d91545161e22ca45ee1f74b91e56faf58d
SHA2564f3ef4e9a2c32f1d62fbfb8b03058cd70dbeb5b5400a4225c9fd0f33fc3922c5
SHA5126b19f59ce05061608d4d571f8a8bfdc91fd4f86792d547fea65553b5704fa08a1d499c5a6f9982320faa9fe444034b78f6474682c50f97825f44f2e2d4c9c1c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5796da13e97140f62cafb349f58c3eb83
SHA1ef5a53ba6800a3cdcbcb73262d60405027cd6aca
SHA256810728026fc7be8496105159fb0e77cf8db4e15ebb55f5e26555a166e54e8d0f
SHA512f6246dad63a52075d710878556d7138ce085e96bfb40c9e4eba07cfbd86d8708d0d87c86998cd89b001f7bf27b614980fc733ba60c3008a608f4c1bd0e659d3e
-
Filesize
11KB
MD54b22557c75aaca76be939f2998d498b0
SHA121c61a165fff8c8096123d26a66a4cc820f8310e
SHA256ca8a765770f5cab1bdb94069ee71cf4e43fd0aaa6e95a416676dcc44267d07b5
SHA51249cf4c43c48904f0a38cec9d005267c778b1a918b7e58b5227207be575d47c301207a1ceb3ec753893a1a1aded52d5a4d2ce94a30f337ba9ab1fa207065c067a
-
Filesize
7.1MB
MD5f36268abee2c16476e68772dc6c8a7d7
SHA1d682b4892211928d7902a58a512f4c849dad9b8d
SHA256156c5a09870d5b984fb991d8000c967694b5be634a8c37f670bb91f1a751ff58
SHA5120ef85e93306f630236326c3ffb5d80a777088cf759b51789e99de1f3c0fbe5e2dc098dcbf80ab094cec79805a505d1d4556bd6eda0f43a112677ed0655e60a7a