Analysis
-
max time kernel
26s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 10:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3oTw61c
Resource
win10v2004-20240704-en
General
-
Target
https://bit.ly/3oTw61c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 716 msedge.exe 716 msedge.exe 2272 msedge.exe 2272 msedge.exe 4572 identity_helper.exe 4572 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 3952 2272 msedge.exe 82 PID 2272 wrote to memory of 3952 2272 msedge.exe 82 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 2520 2272 msedge.exe 83 PID 2272 wrote to memory of 716 2272 msedge.exe 84 PID 2272 wrote to memory of 716 2272 msedge.exe 84 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85 PID 2272 wrote to memory of 1828 2272 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bit.ly/3oTw61c1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85e9f46f8,0x7ff85e9f4708,0x7ff85e9f47182⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,12587599334133919042,13623583380521769509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5c0183596106a06f794c70b4f57ef5d7a
SHA12301e8fdf7ffafd219a0467993d90948ba5388c3
SHA25651f5b804b2bd1bb89d380a3c75f911eede8bc95d478b4502df00c21a38b16449
SHA51255a11fb9ec474daffd6d47a84b53a64d153c5dc0c1cc1d07dae860e9bb7abaf7e5c66d2f165e159d67ede6688158fe0d5a74873209eefd484971b77fdf226866
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
6KB
MD5a71ae27f8a13d0a33beb101a09963af9
SHA1b89755dcc86d1b2ed2c9ce63e8b4c2b70f8685d8
SHA2561eca46a43a789beff8f9aa621ac92142cf203af32b02032da08a24874e5afca4
SHA51240708a6605dd6222b126913eba3627446f090853eab44cf82320b0d9ea32233d7613017e2b41b183d3301cbb50b3cc9c42de6cfe7c928fc9e547bdd0922d1660
-
Filesize
6KB
MD51fe6365c1e012b8d79cc2e89634479e8
SHA12c34c07ddc7691ab0cc915b2c79e92310dfcffbf
SHA2566cb4244027c2597dbfa865aff0de95ef60d1da5ca81b21c8718d7b86b0c2ef0b
SHA5128f7b9fac4948a1c759283a02e544261894d8c3d339a26319826f7fa84fcd3d777ca0098062a483618221bfc40453a8792ca19673926d58aa2bd5bcbae7c6d88a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD56ae96f04773a77f5963ac934060a41af
SHA1b92f28b2572631cb630621c40484c015c1c1280a
SHA25677a1253c57da3c3e8244b45a0ff409998edd9247bb0b5a7bcd5b14645752ea90
SHA5129a551d3c1de329e4609413f1aac0f59559ad9364c627ed1ff978611ccd0bca929a8e921f979b92a2d95d2b6731fe8c0b7556a43987a6fe9d1c0c474cb94a622b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57faea.TMP
Filesize48B
MD537af8a48fb7693739f5d104bdbecc227
SHA1726c4e8a8a380ef22d511b7965aa95ef710bcde3
SHA2567dccab829baa747948bded398bfd47423f2f21f8bf51b9aa2ef0eb1d34a186fc
SHA512b60a8986247579f0667a1d47ef131922a36ca1485c8cbc6ee861f272f2d4c99f901b82753940ff1e5bd4fbbf6533a82f57206d55a16f1b81987f4b62a7060515
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5092cd4fb226ea70e088c4e14bc2d80ec
SHA15c03f0b9fb58323d22e9cae6af9739ea679b4781
SHA2560882677d0fcc6af8c8dae5f97562026048f6a719ead88dc36eb61465cb5ffd31
SHA5124bc9ccedb4f01be504e75b73a833df899ab50d18fbc9a2ecd98668d70fbe7872ca27b284c86a13d935eafa7c48a2dea6ae205efddd0aeecef1961f2fb2bba8fd