Analysis
-
max time kernel
50s -
max time network
48s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/07/2024, 17:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tria.ge/240719-vex75a1arp/behavioral1
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
https://tria.ge/240719-vex75a1arp/behavioral1
Resource
macos-20240711.1-en
General
-
Target
https://tria.ge/240719-vex75a1arp/behavioral1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 768 msedge.exe 768 msedge.exe 2592 msedge.exe 2592 msedge.exe 2788 msedge.exe 2788 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 4172 2592 msedge.exe 81 PID 2592 wrote to memory of 4172 2592 msedge.exe 81 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 4944 2592 msedge.exe 82 PID 2592 wrote to memory of 768 2592 msedge.exe 83 PID 2592 wrote to memory of 768 2592 msedge.exe 83 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84 PID 2592 wrote to memory of 1136 2592 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://tria.ge/240719-vex75a1arp/behavioral11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb570e3cb8,0x7ffb570e3cc8,0x7ffb570e3cd82⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1728,13448445383993940663,17952955585953845622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54656c526f71d2c1122865ef7c6af3ff5
SHA161684265064c225f323d304931ff7764f5700ac2
SHA2567172417b8464d5c2f52edfc867f4d83e475b58fd316b1916cdde30ed5bdde80e
SHA512c3e4fc0baa216ef561a448e42378af01a50e0ebd9b5fe554c9af0ea3362b9ca2f4a1b99cfab66c18df085250dd7a5ca1b01ab256e28156d657c579f5518aa56a
-
Filesize
152B
MD5bc5eae38782879246edf98418132e890
SHA146aa7cc473f743c270ed2dc21841ddc6fc468c30
SHA256b9dd7185c7678a25210a40f5a8cac3d048f7774042d93380bbbd1abb94d810d7
SHA51273680b22df232f30faa64f485a4c2f340ba236b5918915866f84053f06532b0a722c4ee8038af3689ac04db41277c7852f7a11a0a15833ef66bcc046ee28afb7
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5f892c8026b753fdb6bfc71992c042473
SHA1885f7963f9e853038439b78de24ded53fc172c3a
SHA256d8c50ba5e4598d6d3de13c104e80f1bc18f5c7deb55751e94e79c262d1fcfa32
SHA512793f6a39c650b62e238321dacced54c5a86d74ff8372e8842e3649c87de2df4f33cd76bd7045e6330cb176d4080a74891cd68db1476bb0d691e2ea0b1fb79219
-
Filesize
5KB
MD51d7a82bc08c1fe04eb5443bad9451e25
SHA13da94a3f80d495557c7694f98b4305aa86d7f275
SHA2562da9ca1807891da52bba931d27b6152f77a1bf25dc276dbe303272d43d4e8ac6
SHA5124de6fdace0e04cd7b5d19b95b033ae73f62ae77c8fa23655941a0bc39efcc6c03b81d79010a839fc6be132550df04ef470ff81fe2c80627db77ad2a6b055102f
-
Filesize
6KB
MD5a693b837c26810c0bd49888b159c2793
SHA17b5b7e6449a06369e804de962fbf9b9d47bfc423
SHA256215343181806b3d2e7760a72564b6eb61932bf862b158a8a8cac0e521ceb8845
SHA512b1df17827a76680bbd72bae3c4a4ffb68bf9057332f32b4f0d20370a4c67cff3c60c3c7368fe5c65180a1f0086f1f7ea552803b4d416d0145e16b4f493e7a2bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5045e72a65290cf2c6a8f7e6cb733f257
SHA1371ea9401c3e7cc8b07cb265cb8c51d4e0d2fa67
SHA2561f705364f9fe81d4b832f5e1cbb81dfd5ce2769e2dcb1a542cf8b3b7a2c7bcbe
SHA51234b79ae93c2ad2835c267d32b528769c31385cb4d1ed2033364b7a5e1310040ede971f80e9d5ffcc3b8b313ff11fb00de4338074753e0c1038f8a324c9bbcbd5