Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 02:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://tracker.gg/&ved=2ahUKEwj08KTo9piHAxWywjgGHXAnAKkQFnoECBMQAQ&usg=AOvVaw2XR23aZkLaN_S_Ns21UqiW
Resource
win10v2004-20240704-en
General
-
Target
https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://tracker.gg/&ved=2ahUKEwj08KTo9piHAxWywjgGHXAnAKkQFnoECBMQAQ&usg=AOvVaw2XR23aZkLaN_S_Ns21UqiW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 1092 msedge.exe 1092 msedge.exe 2012 identity_helper.exe 2012 identity_helper.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe 1756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 3712 1092 msedge.exe 82 PID 1092 wrote to memory of 3712 1092 msedge.exe 82 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 4928 1092 msedge.exe 83 PID 1092 wrote to memory of 3624 1092 msedge.exe 84 PID 1092 wrote to memory of 3624 1092 msedge.exe 84 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85 PID 1092 wrote to memory of 3504 1092 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://tracker.gg/&ved=2ahUKEwj08KTo9piHAxWywjgGHXAnAKkQFnoECBMQAQ&usg=AOvVaw2XR23aZkLaN_S_Ns21UqiW1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6a6446f8,0x7ffd6a644708,0x7ffd6a6447182⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1444 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,4747059476228818329,10536569875700612709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
Filesize
17KB
MD5bc03fb33776b86dd9d59469a30a9cb35
SHA128ae7ff0e18b35ad9d762d838d8a191005d14a86
SHA2567bc7d146a97d5b813fb4fe35bb47d6a8392ad35040e1d37dbac01e3ebda37300
SHA5121ea72543bca22e32b9c8ea30993ef6771b7d924b15403a2976c0297085ad88b4c74dec321891c063a6ee4498acf13cce6eeb0f6456820bca030ee60518dd3b13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD5e83a6cc6092d0cad8a14d0763e74204d
SHA1d9628479a0895c73e88604531bba3909eb7001e4
SHA256ac96f1d38defec1a2f73e85e8e593c4d6421dd425935bc202630eca2d23a9d87
SHA512c231a7ea9268324f2da86b526ff3a91bd171a93ebce15c310795e6a7810a86b059e32bff2b97702ed8e5b475e2c7535dce177fb519cd201780ef0decf7441b7c
-
Filesize
3KB
MD5df3a00fcb273bedafd2ba90065e1daf1
SHA1df1d54219439ad6ac7bdb11815fc76f25c2d31ca
SHA256f68d7c4cc0428ced651215e3fdd37218ebe47b4101145e776f8eb77513f7e07b
SHA5124fefcc91273218f889050df7823d4a2c6c9d717ed34b57f76bd977adc766390dc6f28a6cb209433a794903ed5e7304282dc2c4fd5ded5bf414bae2503523ab65
-
Filesize
7KB
MD5a5090e60e5612a6e6c7bf90e768fe50b
SHA1d787061a6c9918b036ddafba667d8b599fe6c334
SHA256b91eabb6392dcefe633d259ad83c6b313a413e68bce971c45dbea10ff9bcfa75
SHA5128efa348c6361ea6a107b7139ac167da0a919591d353db7728e32066062d6c8f0589bcb78c6e29ac448233ffc7ecd67d6fff67fb1a7a699b4cfe86092f6dc06af
-
Filesize
6KB
MD55afb621792c08312bdfd3d1db5057d59
SHA12173ff459843efa9e27486ded475ed6fee3331d8
SHA2566fc13bfedffebfe199044f24642547ee87e3e2897bb087b1c81455158fb9e9e4
SHA512afe97d96e18605861f1063a93bee3613f35cf5aafb071aff6c6585f93a309aef3741d89b05cf3d6a70a0f6ff6828b9179bf3bd4ea20bf5e77b174ddd6a80fabc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c9a642b86f02682e50fc707fcb1de3d7
SHA1a9b16c0ea807dd598909d4acd5571e3c32a9edff
SHA256a73b4259253ebbb02d1d72d32ad86bfd83159fee4b279623ddcd67e8405e4891
SHA512b9ad20ee0e3720a6fa54290356b79fea414bd8d1264f112048c3cc733f20e4edddfb6266cbd8b0a7d5ad45942b14973eb4b8ffd3d3a9748bcb0880111b8e4e2e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57eee4.TMP
Filesize48B
MD5022ed6dbe4f171db46ecda58c9034525
SHA155f7358e165b91a157a887c0fbd7a1a19b684434
SHA256422d8a8b64774dced1698fb7e05fbd558eb39bbdb35036f2aa8a95d572968283
SHA512dd44be0a736fbe0148b08e9068a37e94d57a6ef84cc63bb7ac835a74947cbd1986fea5d58f0abf88bb6fd7cd555c576c5c08d8ccff09d318ddfddffdc319c5b7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e3f5b4c6875bd08ca05784007c7489f8
SHA10a66a626dcbed9edb5afff154c412c7d13639dab
SHA256de8ce76f602ce798fb480be6c56201ca1110ce39c81df1047cbe932f58d0c271
SHA5125f76ac5dee548d71fd8806c4e5ca79e5d3527278ce01cc0db07337d93088dfe5216e2334272bca55afe3296f3224fb3717a63dfda5b9fa1675774dfa6ee3c91c