Analysis
-
max time kernel
481s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1265468121448185966/1266075546098466938/FovPakMaker.exe?ex=66ad0ebc&is=66abbd3c&hm=16115e47c13a7a003c4cdf58293e8d832ab5de789d42beb1ba6453952f3edde6&
Resource
win10v2004-20240730-en
General
-
Target
https://cdn.discordapp.com/attachments/1265468121448185966/1266075546098466938/FovPakMaker.exe?ex=66ad0ebc&is=66abbd3c&hm=16115e47c13a7a003c4cdf58293e8d832ab5de789d42beb1ba6453952f3edde6&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 271099.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3212 msedge.exe 3212 msedge.exe 4372 identity_helper.exe 4372 identity_helper.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 3144 3212 msedge.exe 83 PID 3212 wrote to memory of 3144 3212 msedge.exe 83 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3620 3212 msedge.exe 84 PID 3212 wrote to memory of 3176 3212 msedge.exe 85 PID 3212 wrote to memory of 3176 3212 msedge.exe 85 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86 PID 3212 wrote to memory of 2788 3212 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1265468121448185966/1266075546098466938/FovPakMaker.exe?ex=66ad0ebc&is=66abbd3c&hm=16115e47c13a7a003c4cdf58293e8d832ab5de789d42beb1ba6453952f3edde6&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbce646f8,0x7fffbce64708,0x7fffbce647182⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3452 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6408 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2522734978635168532,11299523801410116416,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554a5c07b53c4009779045b54c5fa2f4c
SHA1efa045dbe55278511fcf72160b6dc1ff61ac85a0
SHA256ff9aa521bb8c638f0703a5405919a7c195d42998bedc8e2000e67c97c9dbc39f
SHA5120276c6f10bb7f7c3da16d7226b4c7a2ab96744f106d3fea448faf6b52c05880fe65780683df75cca621e3b6fff0bd04defb395035a6c4024bb359c17e32be493
-
Filesize
152B
MD5d3901cd618f65d66fb0643258e3ef906
SHA1c9b42868c9119173ff2b1f871eeef5fa487c04f6
SHA2561f74c3d5f4d41c4d5358e63ad09f8cede236eb66957f9888f42abf98b238c086
SHA51289c122ea72ae3f26c94e34040e0f0a856506c8490ba36fce371a731b3f0588407c6356cca2ebea37ac829a67c2b398e298a64d5a72712172f69071264ca58e98
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD5e58632ab539bc3c8c44e29bc9c5d903c
SHA169e5938165784339f6946d2eb2513a271bbe0f14
SHA2566262f8621e34885d26b031dc1d73b8668cc22fccec6fe609c3bf96e6b7214cfe
SHA512fd42871800c1742494eda00cefa5c6d79dfc538d28f33566ac768e6c62768b274a3685d54db657b0257a7ddf29a456a8ae49207719be36cccb5d5b4a27d2d89d
-
Filesize
6KB
MD5c3116a333634c0631029ae27534f55af
SHA19cb312840488e159f4daa8b1efd5febab532e8a0
SHA25636c6a34240a1671706fd6528fb39422b7cc4134debec6d5b12a9902ee9f47d6a
SHA512375101f9515f3a8d8f3262c9a6dee44e2bc155399007d755e74fe3956c51872c20ad939fd174279c6b1387e368f7a05aa65f7227907c6513e3fca3a908b6837a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b537e151be2a86b185d2d65432c42b8c
SHA159343eaffbbc96ab6b03d269c171ff7a7612c530
SHA256e97eb48ff7da841a67510c9b67fd8b9c4d255f53b9e3a25dc29e38e1673ba0de
SHA51212b113b88df2cd785fa4f76c7150fbdb1725a7b03232e455fd77526e003cec85d9da5d4210ce46063028c9f47db15e0046bd2f23489fc0af2246f20c2177d7fe
-
Filesize
10.9MB
MD57d22b09dfd1bcabae58f5ff53d542ce5
SHA1214fdcd04b1d3d34f28a7bccfd8e1dd8181d5032
SHA2564c131524df61149737596009c3b5043667b87137a4848bcd490fd4691d5997a1
SHA512c1c2ceeed881412834de3c8ee06a96e1241da8222f9df0c64e41c3ebf2be39b35e6b0a27beb5ee52f0b2be1927683fef4acb01e6e45e840fd6bd0f643783215c