Analysis
-
max time kernel
480s -
max time network
573s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 05:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ify.ac/1Ic5
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://ify.ac/1Ic5
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://ify.ac/1Ic5
Resource
win10v2004-20240709-en
General
-
Target
https://ify.ac/1Ic5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 4492 msedge.exe 4492 msedge.exe 4008 identity_helper.exe 4008 identity_helper.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 2636 4492 msedge.exe 83 PID 4492 wrote to memory of 2636 4492 msedge.exe 83 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 3204 4492 msedge.exe 85 PID 4492 wrote to memory of 1536 4492 msedge.exe 86 PID 4492 wrote to memory of 1536 4492 msedge.exe 86 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87 PID 4492 wrote to memory of 1748 4492 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ify.ac/1Ic51⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff9e72246f8,0x7ff9e7224708,0x7ff9e72247182⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2588 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,13470791451043597636,4875406438863977208,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5dc6a8d7301a9241fd30a68b3c64fcfaf
SHA18520d68712b28cb50573ad90e6296834588d3b29
SHA256a6bf24a88e0e4c03367f82cbe58baaddc7f7f1339d0ac87b567df08961da2fac
SHA5125f9f6ebc8ca3d26777a6f049955615c249db6ebbf5f34e7a19498d0acd4bfd07909c437e822e50ddbce08af8fe6e90b2c4cc940ca66b00a668bbfcae12371361
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ify.ac_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
998B
MD5ee73fbee3267730af6411819ba2fb9c3
SHA1d562c079fc4cb442648dae1d54b64a8c38eee50e
SHA2569ceb3891c7443d5bf476d291e3d92e052bb630866aba154e65612a22c1ecc081
SHA512ea3fc95975b4dc54bc9ee0d4ff0421480d7b858d6c662cce94568d6db98f5b458863eea9ce9a9abb5bf6d8156413238eaaa56f986d8eb40d94bd4427e67a9973
-
Filesize
6KB
MD529a49d8be04ab498e9fa5d514f4ab5bf
SHA1b6e80d300efc55aa1f0dadc26439e899792f1aef
SHA256d67ee181a6c6b21219e38d9c78f2474e32f0517c3d5e3f2d012fb0203a708c24
SHA51285ec9f99f6be9ffcd04a48fef81e49eb0ca6a8e16dc442dc35fcc643e76e04321b81bc1e254cbab62df966896cd5a489406660a62b1a2d1d33871ec45ef24e75
-
Filesize
6KB
MD5eb6747a04e6c4ff49fa7ac7d553e2ebb
SHA11c7d753b50a0172b93000dc5942e6f912383e933
SHA2562f3d21cc766155f042b2acf88de0e64ae8a952406a139015f1545b67c13f3827
SHA512745f79348e996bd1d7522bf60256b8557c9ed4558b8a5904b36c7662a50e1cb3b1d48d76ad079e16207a20ac8805c16c5a4e6ceded632d213ddc1f3f8bd70839
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5561adcf6442fee1d4738535cbf62ccec
SHA1185515ca2195b3df4f2f24addc421ddd5a484f55
SHA25655f412755493990c1be96ea433c685f1493b0755b8b329e5b344bedfbd887814
SHA512f565ea76b0c5958406697d4661c01aab3610496f7952623fab011934304326b63973f8b3954a19423750f2df9bf9816d5b5ab4d357b3e5d43f813ec7c479b214
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f898.TMP
Filesize48B
MD574e0b10aba93aa0fea66c58bef6894f1
SHA1f092d1bbd9e0e8880d19711fc7544d410ddc6aee
SHA256ad7ecaf6d16248f162aabfe81d77ea46df9eab62be038955795a907f963e7117
SHA512454a93b5bc3347e16e30c7f978be306ca03d394e8aa3b12b71e63c2fc167e06758be04687e506463796a1942f701ef5499559e40babc8e59b84d78527695d983
-
Filesize
536B
MD54faaf90133511e3f71352001cb5bf415
SHA1c04318d47fb57357bbfcef81828e659214d1ce00
SHA2561290971c4dcb666399a545a2c3f1f63dea011d87852b27feedc79c8988184cd2
SHA5128446c638815bf524582afb90c631237e26138f4c32c0c0a4ec224f3db53483f5e4464edacdf5b2b88f1dee3dbd41f86b1e2ad1835131fef4f27d7b80315e472f
-
Filesize
540B
MD564f27b2dd576c82aa20accc24c20e9fe
SHA169b758632a5f5c4cf3adf8784eb27fb8eea0645d
SHA25648e52378582c6e9dfcfabac0cdcc9e127ace37ff0f723eadb4e629a2fccc3668
SHA512820061666103f709ee48edaa03eed9bc9b8a656f62ae24c5d1bade683dcc7ae7f87da1a135bc75aee19a1f56eb9fe78d162d0c72bcad750e23c569a07d9db8ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5aaee1137c9ff380bfb38f9444a861039
SHA1eb608066ef9f3c3bb9333720254cae0ba85f9f65
SHA2560efc99bda1c0fbdd9a4fb94c11b4ea09032240ee9239cf93a37a210bcefd4a3a
SHA512cc780a467ab50f38b3abc8ce2aecbd0d9819d049f7ead12f0eae1f93431665b7f3deb95fa3cf09fbfc3992b9dcb38446d1d713665e48737686a63d547b8339d3