Analysis
-
max time kernel
60s -
max time network
53s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-07-2024 09:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://zpr.io/xY8LEY8X8WX7
Resource
win11-20240709-en
General
-
Target
https://zpr.io/xY8LEY8X8WX7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 1052 msedge.exe 1052 msedge.exe 3392 identity_helper.exe 3392 identity_helper.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4388 1052 msedge.exe 80 PID 1052 wrote to memory of 4388 1052 msedge.exe 80 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 1700 1052 msedge.exe 81 PID 1052 wrote to memory of 2328 1052 msedge.exe 82 PID 1052 wrote to memory of 2328 1052 msedge.exe 82 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83 PID 1052 wrote to memory of 372 1052 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://zpr.io/xY8LEY8X8WX71⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa9cea3cb8,0x7ffa9cea3cc8,0x7ffa9cea3cd82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1884 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1860,15372011136853043800,8449095205638208378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54656c526f71d2c1122865ef7c6af3ff5
SHA161684265064c225f323d304931ff7764f5700ac2
SHA2567172417b8464d5c2f52edfc867f4d83e475b58fd316b1916cdde30ed5bdde80e
SHA512c3e4fc0baa216ef561a448e42378af01a50e0ebd9b5fe554c9af0ea3362b9ca2f4a1b99cfab66c18df085250dd7a5ca1b01ab256e28156d657c579f5518aa56a
-
Filesize
152B
MD5bc5eae38782879246edf98418132e890
SHA146aa7cc473f743c270ed2dc21841ddc6fc468c30
SHA256b9dd7185c7678a25210a40f5a8cac3d048f7774042d93380bbbd1abb94d810d7
SHA51273680b22df232f30faa64f485a4c2f340ba236b5918915866f84053f06532b0a722c4ee8038af3689ac04db41277c7852f7a11a0a15833ef66bcc046ee28afb7
-
Filesize
5KB
MD583a1bedafdaa7afa950c9ec02112380e
SHA1592bd5211d6bcc0a5fa51926eb9e24c9a06ffb22
SHA256824a220136a96ae682bf8eebf1f3a948ecee2a2780dfcb53cfc942cf6ae6838f
SHA5127eafd506f44a2501c775a83b9c451bf4bcd96785ac410153df37ab9b096b15c423263bcf76fa71392aeeb508f87ac13a2feedab5c0268af5b952baeafaa41e91
-
Filesize
6KB
MD5da0f9b18c4f40ad4b1088faa884b84f1
SHA167ab440ec577cfc3abcb28348608cde06759e42c
SHA256a8742f1a9b94c0ee11b3bea28d53d58426caa984f239532b015353ed7a2b9a43
SHA512bbc0a51db2f941fe6ea3225250a9e256b3645f716e45e0a2b48914935fa739cd17773c2fa5fdd32ea55853c04fb431f7de756069af5321fd41ca3d494f2b39e2
-
Filesize
6KB
MD5105f97ad0dde9d3e4757a9ad256c5c6b
SHA186dae105e0d11122f18538d0e5b5d875998e13dc
SHA256ddeffa4421595189a3fc9202ccc478e8896d87744e114e8bddd0fcbd88ae4bc6
SHA5123bf91fd80a1206e730e50f49c7d5171b37496d6109259d659125c17de8b8915ecbc7f0282d788cc37e5e69783c0a2990b81eb622bda7fcb16ba04b63546290a7
-
Filesize
6KB
MD5a34f71adca82ae584bf56f453eeba76d
SHA1934d6cdc5acc4da9e610180f9f07fb1ff052e534
SHA2569142b4760ff9f17f48442882e73309e5ecd10cbe3e2470f4f3112f8822fdd86b
SHA51278548d75419a50c1b869c1b5e769b021780fe548c361bfb6e884a42de7c216ade608f1064ee658cc533fdd848060e6895e8d291b69d3a08fae08785c35451d21
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c26976e458e8c4d6ce83357510bbf19f
SHA1ccb3fc7b859accad4a1f7bc2f23ad5bff03492f7
SHA25616865b4e25b1f7013d777944309a7fb3403fcb3136c8afa9d42b82e02abc80ee
SHA5128284afdf22f602d6765198ad17fb22fb9da92bc1a35b9566bdf88da7d636eed9deed5ae462eb9b6951ae8e8f35209273d2f41b174cd2f7f1bf87471fb5dfc293