Analysis
-
max time kernel
55s -
max time network
58s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-07-2024 14:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vimeo.com/547034863/f8f5f6a68b
Resource
win11-20240709-en
General
-
Target
https://vimeo.com/547034863/f8f5f6a68b
Malware Config
Signatures
-
Probable phishing domain 1 TTPs 1 IoCs
description flow ioc HTTP URL 13 https://vimeo.com/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a7434aa7900368f -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 128 msedge.exe 128 msedge.exe 1020 identity_helper.exe 1020 identity_helper.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4340 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4340 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe 128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 128 wrote to memory of 4448 128 msedge.exe 81 PID 128 wrote to memory of 4448 128 msedge.exe 81 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1544 128 msedge.exe 83 PID 128 wrote to memory of 1876 128 msedge.exe 84 PID 128 wrote to memory of 1876 128 msedge.exe 84 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85 PID 128 wrote to memory of 3572 128 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://vimeo.com/547034863/f8f5f6a68b1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9b8b13cb8,0x7ff9b8b13cc8,0x7ff9b8b13cd82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3380 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,1056869350381908895,8896911715517510196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:1944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004C01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b26cef15e9a3cc82fb429a163f96ac6b
SHA1718ac4822198b1a21f43b6941d0d8df107fd0015
SHA25673af2c2ebc9187187d887e4abc8b04561c55f36f7f9cdf20293d522ce5c2f506
SHA51287f96314ea9a1f394d24de5657e61cc6809c961fd05280b4875a06bb928f4e19dadf725fcd0417f16c93cdceca349dd27dd95d0f8f0f756020322803b2f91cdc
-
Filesize
152B
MD55efcc43219d778bd14d32016100f2708
SHA1b06f6726698a68781854bc342a54e06bc4562217
SHA256a7534c7d125854f7fe662a7951443cad1d1ff0d8d3eb537dde5a381cd3415666
SHA5126bbdf16b41bbc3ac5d4e2b93683a712d56eb58719799f69cb7240a77f799928b48af2771f76d9d7829846db12d0116e3a8ea6c5d0f02d5e840db1b3c018480b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD586db27aeba9ea7638c46737dfe41e929
SHA1be389f30c5d66978354d2dc04a2fb685b894932e
SHA256ca9f42c359989c9742d5018172f1a3ddfbe3d0db28f27fb52c254563b3c61682
SHA512ee7a8cba7d7fe15f0c215c8db3e7a9f749efb2bb40d8def8ec86032a6845bbca6057e9fd20783bdb93c7a98f3c46e312e5717a05485c357756b1e3f2dde358fa
-
Filesize
5KB
MD513e4714680105a8d35b02c10e7c38914
SHA1417f081318f02131acc7450d7036b93593237e6c
SHA2562c9469f8556305a4a32594387b1b0619dd9f4f44ff1c52e6ec5ad86cbfd06f80
SHA512bebd0c06205b93e6c2112633a09cf3484c74b65b8245dd61f6aebfb747e219c426f766df13f8ddbd71ea737fecd5c2295a2bb898c279f05d7f9963503a87fbe6
-
Filesize
6KB
MD543ff7beb834068a269a184b5c24aad71
SHA173d93d7f03d7f82bfed06548339b452966929b56
SHA256e43c2a9e14737f2e926efe30a179dddbfba075fbc577b6e430f8d2034b0f72ef
SHA5126fdd861ea98c79c7d59f16f3e986ce0b290b62f03ac176b69799f54abb9604b83c8d735d0adf140c9afba9ac7894695aebff2c4ab4ec1a0c74e1025811fa5486
-
Filesize
6KB
MD5542171075313d36576b4686e867ef0e6
SHA1649f1692d4c02fb3766a7e93757b15d882f209e2
SHA2565b27813ee4d1b34b58d47de4507326380883b73611f9b2c9d105817265e58c35
SHA512b3ea36e97048740a4191579e105eae0a63868c90b43d914e8cf698ab4f65f5b2893cfb6532a56c9be792a1be6cd742b50728f90dbf91eb199e3f4a2bc85b0fb6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD527d736bd11b9d882c2369f774cff9026
SHA124f3f7064aa27e9f30bbaddc478c20bd8b040a5e
SHA2568e49bdf9406aef403dfd811b169fc367b0ddf38f28ede5469487c4d784a22677
SHA51292f395cbbcf2aa336a87c25096e9c8e84087d5cdd8190de99867f6143299b701352881a7b2e3cf68b98f5c26b3084ce52d97ba5223a7bb1a58816ca901371be8