Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 11:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cl.gy/XWop
Resource
win10v2004-20240704-en
General
-
Target
https://cl.gy/XWop
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 4168 msedge.exe 4168 msedge.exe 3240 identity_helper.exe 3240 identity_helper.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4168 wrote to memory of 404 4168 msedge.exe 80 PID 4168 wrote to memory of 404 4168 msedge.exe 80 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 4640 4168 msedge.exe 82 PID 4168 wrote to memory of 3068 4168 msedge.exe 83 PID 4168 wrote to memory of 3068 4168 msedge.exe 83 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84 PID 4168 wrote to memory of 2352 4168 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cl.gy/XWop1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac4a946f8,0x7ffac4a94708,0x7ffac4a947182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,12637046131692156054,3134071358191109080,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a27d8876d0de41d0d8ddfdc4f6fd4b15
SHA111f126f8b8bb7b63217f3525c20080f9e969eff3
SHA256d32983bba248ff7a82cc936342414b06686608013d84ec5c75614e06a9685cfe
SHA5128298c2435729f5f34bba5b82f31777c07f830076dd7087f07aab4337e679251dc2cfe276aa89a0131755fe946f05e6061ef9080e0fbe120e6c88cf9f3265689c
-
Filesize
152B
MD5f060e9a30a0dde4f5e3e80ae94cc7e8e
SHA13c0cc8c3a62c00d7210bb2c8f3748aec89009d17
SHA256c0e69c9f7453ef905de11f65d69b66cf8a5a2d8e42b7f296fa8dfde5c25abc79
SHA512af97b8775922a2689d391d75defff3afe92842b8ab0bba5ddaa66351f633da83f160522aa39f6c243cb5e8ea543000f06939318bc52cb535103afc6c33e16bc6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD554235939b8509a00bf0468c9b83ea507
SHA1fbaf40772183b760720cbacf6c70fe35c4e28349
SHA2563cccd1d7667f56bf8af7a48134b955be7daa5e7288b944dc6010400c363d4592
SHA512e7beece98b96125155e1a16a4a0d813a503bedab21875d123af2abbc14d508e8782605d6a3b51ba9bc302f65c0986d05b588aacd46e2d6cbde377403b968b8db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD513edf5b36466b46bf605b88a7168674e
SHA1fec672287b8b750c2d5eccb4ae209fa33f07525d
SHA256fb14605557c212917013f6b95a4d135f91df5aca2b2dce2a6677d1a011789023
SHA51219532922bb268ca401f228b5b4d6c4219dd9777b7fc729b5325e3140e883b84a16fcd5cd38866ced7906543b2c251321b587b2ba2f5b30b74dfab4bb61a20e90
-
Filesize
1KB
MD5bfe861b4b26de6bafde140c7a37ba7bf
SHA1ba6145900e67f62bde3bab6730f07a9fa1337a38
SHA25613e0f056d67d742e6c8c1b92465443e0bbbcfb57d5195b66c05ca21ed2f4bd68
SHA512ca7b411491633ac763249e3f52266102fdf05a7e68b0dd34e5e2c1fd1a061b47c85c5641d666119093ae45fea8303ae3306f762e1bbbb7b5de8cbe0671441b3d
-
Filesize
6KB
MD5004212cde054795c8ace203ea01ab15d
SHA1fcd0d7978157082f8e3ed8ef058474b808d42013
SHA2561a1327837c90630e8e0151a1860977aff616cf548b5285255ba03c328132a2a0
SHA512897a9ebc7454fed64335ae1d320e0f50ff72393a75c4c319f62536aff0915e4fafe4c25a7296bce509e7767b1e1a59554b4bc9f44d263b0be0f3107920f5b639
-
Filesize
6KB
MD5598931f96c69d80f9cadea39320a5fca
SHA18dbb2bf4ac5aebc4eabe63cea0e7429bf12b2628
SHA25657e24cd7a590c411b9c56f6951ab77e168a3875f82f01c4f7873e6e93b501d08
SHA5124f71afcc69f7116b96d32d49d880abdccb897f785b6e0dc47295c5c6ad46ada4680c8430421d6a164178cd1e90eb5bfb450c7311b5629a59d8f581dcddb5e6ce
-
Filesize
6KB
MD5b01debd86875149c76bfd0a38eb9bf6e
SHA17183da9c4b710df456af391b22583fef37eb577f
SHA2561814082b794ad5959803ca10e153522db0556e0a214156f8d42a42b0e2c23cb9
SHA51227565084c0a8b1e1a8440b7d985889fe9fd33e3e13aca253db8a5f5c2027c05b49e3044988bcabf70a20e795b0f7b4747badfe63fe038b4296af0136452191fa
-
Filesize
697B
MD5fcc68c8bdc44d070f01637024edec300
SHA12f66e82d9dc49e8ccb47382f020f5640458c03d5
SHA25621968bd1e6b39a36b7240f2743f2bbeef1855c7213c34d2b56272dfa3387c8db
SHA512dee0bad872b22f21aa26f6af908a88febcfb33314857c4893cfded503a13ed6b33aacb5cc0e5cbab0e696c6e2fe16385828cd3c6119b76c697421b57008b2e65
-
Filesize
697B
MD53f159f5cbf5690c570e451ebd5b97efa
SHA176ad6694a731eef31306bdd2715609f22a97bfe7
SHA256ba9a761ba4cc3409b925292ab5707517db7e5d63fe5f23b3ba15c264aecab0f0
SHA5122f1e84f41b11f9c9ef922aed550f1c04b9c130c86277479bce223effd5109b39307ded210eb368e6a9163bf95833f4e7d021b29de82162abff6889349c0e74e9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ad3afb6a4f308427a4d76cc61978e542
SHA14c3edfbefd70bdb87a9e6c89d5ae3ad9351202bf
SHA256b57de48a91878709dec9721443d403956fa78751e70752f5f522a747b26832cb
SHA512a93ef26bdb59b75fffc2b43b2d4fd62d9d5a7d00067dba8dfeef6515f86a1ea486c425d48b86bf54c7c0ac192c9c382b9b2053f44e2aa96c073c926601fa76f7