Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-07-2024 15:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3vMuSNB
Resource
win11-20240611-en
General
-
Target
https://bit.ly/3vMuSNB
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 23 camo.githubusercontent.com 24 camo.githubusercontent.com 1 camo.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 428 msedge.exe 428 msedge.exe 2324 msedge.exe 2324 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 1460 msedge.exe 1460 msedge.exe 1108 msedge.exe 1108 msedge.exe 1108 msedge.exe 1108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3104 2324 msedge.exe 77 PID 2324 wrote to memory of 3104 2324 msedge.exe 77 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 2980 2324 msedge.exe 78 PID 2324 wrote to memory of 428 2324 msedge.exe 79 PID 2324 wrote to memory of 428 2324 msedge.exe 79 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80 PID 2324 wrote to memory of 2828 2324 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bit.ly/3vMuSNB1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff973f53cb8,0x7ff973f53cc8,0x7ff973f53cd82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,15283612313935027904,17233568280148754777,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4644 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD564f055a833e60505264595e7edbf62f6
SHA1dad32ce325006c1d094b7c07550aca28a8dac890
SHA2567172dc46924936b8dcee2d0c39535d098c2dbf510402c5bbb269399aed4d4c99
SHA51286644776207d0904bc3293b4fec2fa724b8b3c9c3086cd0ef2696027ab3d840a8049b6bde3464c209e57ffa83cbc3df6115500fbe36a9acb222830c1aac4dc7a
-
Filesize
152B
MD5a74887034b3a720c50e557d5b1c790bf
SHA1fb245478258648a65aa189b967590eef6fb167be
SHA256f25b27187fad2b82ac76fae98dfdddc1c04f4e8370d112d45c1dd17a8908c250
SHA512888c3fceb1a28a41c5449f5237ca27c7cbd057ce407f1542973478a31aa84ce9b77943130ca37551c31fa7cd737b9195b7374f886a969b39148a531530a91af3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD57b7c93587f7231b46e28fc9fe019f2a5
SHA1b9f3f1d50e630fde084ff5caa32398e4481a6bfa
SHA25681ce58eb5bb914a625c43f92c8899a1939d8805180f17bf34d7d8a1c8e09d91b
SHA5124ac672b7cbc7ff9f8090e9f3b39da3f4efdc770e371ea579db5e20edfa83e9827825657439539f0b5c747a7f0e03fd27f302bf0d2df0901d0fc421f47c743300
-
Filesize
864B
MD5450d93d79d50d7055674438dafcc4360
SHA100f40607403abd0e9b956e672157e2aa50a87af5
SHA256cf5f70b8167a9d6f457ef2a155bebddee5c817d552bedf3ad26aaf0908eb18e6
SHA512d8fc56b7f0d6d860a318ca053d852572229cd5db5aa7aa1e78d0c81e88d1f26cb38a78cca16a8c9b8f3360cac49b5a8849e8706bdab9fcbad4bac9bef0820ff0
-
Filesize
5KB
MD54194346a5128b7e413fe19e45b267334
SHA1fa06862b7b030a6d9d1507590e98788054a9de06
SHA2563277c90446a0cd7d7f7868671847f2e50155388d80ee0b2608b8162e24bd05ca
SHA512e5a974e968ed2a8d93c5cafe19bb97b20e3a44a1bbd9c65611237c3661f9937631d68301ebb3eae79100b6331a323d1061d0165373408ab3393474fa5c5cd87c
-
Filesize
6KB
MD52aa5a3ae9da5da93c7f98c02b6c4de69
SHA1ead3f59d97f2fb10a2f31d4cb33e98426b0a8dd2
SHA2564a9d5336256953f76475c69959ccc297f4872ff89d3059de38331ce8a347f23d
SHA5124aaa5fad9711751cbcdcc1750cc2b5195ca127db060bd7c6ed62974c6369da8c2d9eaf958810946827d6e6afac0024475f0a1fa27e1e83c981dd6e059a009807
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fd43e5a422f313739ee0182be76946a7
SHA1fc76f6f6d9a46c41b751a60bc050a35f701bbae8
SHA256165ecbc1d87f2c151b65ff1450bf8fecdae9cd749bdbd28b2ecba663bd140a48
SHA51248a025d7197a2b2ee3df543a9d63ec53d5ba3d947e9f38a8f2506d6887a6a5c4d8228c3dd991c1ea7bd210bdc32658738b9d18930d96f802e4479d80dbb0b0d8