Analysis
-
max time kernel
1682s -
max time network
1687s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-07-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
start httpswww.dailymotion.comvideo.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
start httpswww.dailymotion.comvideo.bat
Resource
win11-20240730-en
General
-
Target
start httpswww.dailymotion.comvideo.bat
-
Size
47B
-
MD5
2a565f8142203f2f7df3ca43f8b55081
-
SHA1
e0dc0fc6274234e7738c246dc6dcbb4811c49417
-
SHA256
5c6fabb375f1b5227747c2f22868f552ab696881903591632de43a6a46c99dd5
-
SHA512
b0af1e521f95719718a0dd0015c47b72471d8b4bac918f527c854726994f06cf03a44e85454de56f18fecce670608ecb268b4e19cb30c90a04fcc5284baa1311
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid process 4428 msedge.exe 4428 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 1104 identity_helper.exe 1104 identity_helper.exe 2524 msedge.exe 2524 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exemsedge.exedescription pid process target process PID 2452 wrote to memory of 3224 2452 cmd.exe msedge.exe PID 2452 wrote to memory of 3224 2452 cmd.exe msedge.exe PID 3224 wrote to memory of 3720 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 3720 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 2004 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 4428 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 4428 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe PID 3224 wrote to memory of 1756 3224 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\start httpswww.dailymotion.comvideo.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.dailymotion.com/video/x930dww2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffadc313cb8,0x7ffadc313cc8,0x7ffadc313cd83⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:23⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:83⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:13⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:13⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:13⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:13⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:13⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:13⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,3104712523277147305,10532248054446344224,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5812 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50ce5d292e9dab802a3c25f387277f3e3
SHA1afeab24faf943fdc8a89b2ec0b427cb4d38c87cc
SHA256011c29b70b474f741b42164aaa91d7986b4a1e817e8921f4b369dddf5a2f6cb9
SHA51286a887988c29adf4142248557cb98a6bf7867eaf3bfec8119f5bd52146ce1b1bfae39967dad757da4fc3a50ce198d170078c87958269e24e46db58c842eeb775
-
Filesize
152B
MD563cb45e3f96b8c6c1ba49b00b759d0c9
SHA1834d5b6a3499947e31278c13a296c950e19b2f9a
SHA2569b7241b1a66ebbe196c1c3c8349d8076cf10909619807558d058509809ef81f6
SHA5128c0c03e5a2bc77e3c38246acf43ede102d3094d43607959c2762c6b96fd199d89144e2eddc01a03e9d337d2c125a87aeb8367ef023757c2f2a57f9d23fe29ee6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5ed95c2901d99187427b3450497d61fb0
SHA145bacac539653850972ca98891c425358017b061
SHA256f2e8d808cdd7cb408c36c03e584ce8729125d50697eb792e297b0a3593efdf69
SHA5124d61a8790609dae5c83dd569fd606a5e7bab177d23bd4115234fc765a7ad99ed2207b2307562be0e6e3d12470c3e47445cc8249d3269edefbe8be8cd4fdf956f
-
Filesize
1KB
MD50341dd4ffcf79e7504c9964d0d4ddaca
SHA150e32fcacf5da98a10e93c098b705d7ce8ddb674
SHA25603d720be2935d838ff13ce1ff53ec9d3d404709d260615bbe9144d6baac951b2
SHA512910ccd3c5d0396ba5bf602673d538605a8f6f5dac617e347256593e1736db37c6952482cb4b7bcbc4805764d42266a365368e85e2564b148a0d08919ff2e9bf4
-
Filesize
5KB
MD5bbd410cf2cee246d71222e641daf5572
SHA14bc23db6dffa689957361425fd0c3e987eb4c872
SHA256ec8f635a33567c948292b4b00240db48c1c85356bbccc961e4dd7931cd9f5fcb
SHA512fd3710e8ec1c6fb7545693ea6871586f84108cd45810481994bc80dd3cb60447099a2fe0c810d84c694cf0a8e4114ce808d8c4ddab89df2e49434b9998ab49d2
-
Filesize
6KB
MD50794590d163c0883f681785e0493f4d2
SHA18223b0a32f5fed9e9146cc088ddfa0e601e237aa
SHA2560bfa8a54d95d3d5322ae89a8bf5ccee8eb6d044be662cca3a48d1ba3e4ccf722
SHA512183546059a8462bdd77c2ec278525f3071b64fb35a468b92350b5f6336c61c161b38969e52d8646e21339a1e910e3ed18069716d95e11868395fe9f28223d73f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e24074ac769e8fd437100e3475d862d8
SHA1b6ec2e5f98b59d118920bdea2e146418ae2598b7
SHA2568be4bd174700a974a07895e82d54c36f8d15f7f60d75d7c611a7520f928b7c9f
SHA51232c731368398f982304051d9d8dfc36a4d4f3938bcd87569192cd3ec917308674f3afe9427c376658cb78fef60f530886b9062b0ecc34e80dc89e89cd92f47f1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e