Resubmissions
09-09-2024 19:47
240909-yhlkaawgqp 316-08-2024 15:24
240816-stchvswbkk 319-07-2024 09:10
240719-k46wfswhja 119-07-2024 09:10
240719-k41z7stalq 109-07-2024 04:19
240709-exzwnswbnr 808-07-2024 07:13
240708-h2an5azgkg 607-07-2024 10:00
240707-l1l8ba1gqb 1007-07-2024 09:59
240707-l1e41a1gpc 106-07-2024 07:41
240706-jjdhqstcpg 406-07-2024 06:14
240706-gzq3na1blh 1Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 09:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com
Resource
win10v2004-20240704-en
General
-
Target
https://github.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 736 msedge.exe 736 msedge.exe 3532 identity_helper.exe 3532 identity_helper.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 3524 736 msedge.exe 83 PID 736 wrote to memory of 3524 736 msedge.exe 83 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 3552 736 msedge.exe 84 PID 736 wrote to memory of 4996 736 msedge.exe 85 PID 736 wrote to memory of 4996 736 msedge.exe 85 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86 PID 736 wrote to memory of 4496 736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd34e146f8,0x7ffd34e14708,0x7ffd34e147182⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:82⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,6231711999543606340,17784374658677119027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD516946218d038f87a2c33b8153caab3ab
SHA1fb7572ffda1b0078667746ebfcc3eb264a71510c
SHA25685d06b706b3365a84acc01937f6dd79a177efdc6df0a6d83049ae945dda47a6d
SHA512bede6d85381f421b9463172a895abe6523d0c8a51c7480a29f4fd011d7570fd1a49b8191a7643996908793843fcef20ad669273a652a671cee0d84ec552ea506
-
Filesize
409B
MD52cf26e6c5e65c1c5a63df8cf7506ade3
SHA19f3c3f4db2250eab25aa5378a5befb6a5138d7e1
SHA256aacf0f0636dea3e810d32adb73306a3ce71b64f81ced2bb7254bf4af2813128a
SHA512a007b76e4c0ddf57deeedd1301aa1b6ddf2bb144312a4ade42febe09e71cc764123bf2b1c56869c011013a5e12ced49aa93fdb715b7a4524e375be970350a821
-
Filesize
5KB
MD526c116b3f23d4003daad3a0917da99ad
SHA1e4193a8a557328632b54363568773e34e87ca6b2
SHA256a894df3b146c07cc406a5ea7ebdd9b463a0a45fc9fc8fba12c6a1cae10a722aa
SHA51236b1cf2ce05a5e9df847b44bfba9f1150dee8ea3ad7d028dcb8fd12066e26dd9bc0ceb6571a009655189a1039114e3a2c7ec64d19c5160eb2ceb11dba2d64e5a
-
Filesize
6KB
MD5eb840938f78a79d540cec34a03baf089
SHA1f98e5201c8573993582a8da1781180ffb9d7d168
SHA2562738977c3ade422a46467a483b6fd951f8d46f3d97e900aba3df8113ad7362e6
SHA512ee3a989cab99a2dd82a9c5c806c31136749aed864d234e3b15c3fbf4274c2907437a0d5d214573238a7f3984dbdf03cfc2c6cb2b7b8d856f496085195a2ce8bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f83f785b559f575af67beb3cfa01874d
SHA1a3a1078fa94a265e479203ebfacbb829a5d90ecc
SHA25627fc892dbbd4934783c261e39ca448c440edd3acbff2478ffd8f3327d1fbe541
SHA512f16af229be51c52e78c4e8948d71b8e7731817db1ac59437c39135abba9832b2707ffcd584f36d80c5702433fdec19203347d603b389d0ba5e19ebd09c909d01