Analysis
-
max time kernel
21s -
max time network
26s -
platform
windows11-21h2_x64 -
resource
win11-20240730-en -
resource tags
arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/08/2024, 04:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/channels/@me/1077955462101737542/1077955470192562346
Resource
win11-20240730-en
General
-
Target
https://discord.com/channels/@me/1077955462101737542/1077955470192562346
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 discord.com 3 discord.com 6 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1872973762-1326452598-87257502-1000\{181729F3-0068-49B1-9BE7-D329B554BF82} msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 4968 msedge.exe 4968 msedge.exe 4868 msedge.exe 4868 msedge.exe 3708 identity_helper.exe 3708 identity_helper.exe 2788 msedge.exe 2788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2496 4968 msedge.exe 78 PID 4968 wrote to memory of 2496 4968 msedge.exe 78 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 1888 4968 msedge.exe 79 PID 4968 wrote to memory of 2948 4968 msedge.exe 80 PID 4968 wrote to memory of 2948 4968 msedge.exe 80 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81 PID 4968 wrote to memory of 388 4968 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/channels/@me/1077955462101737542/10779554701925623461⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc1a393cb8,0x7ffc1a393cc8,0x7ffc1a393cd82⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4080 /prefetch:82⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5104 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,1816047945173851755,4716995191894020402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e15960b37c05dc7b54098cd898fe5a4d
SHA12c7923730ff68a25d23f8e56c3e5b8e62d2a1de2
SHA256a3dd370b2b481e239fa13c330f274b7d279573b77ffb813ba68a4961b36d6cb6
SHA5127e0016a20ed5935f0b0ec2722617661b2486cfde8a9f0901c5f01b23a1545f8637149e5086281f02d834a6be112cbc8eae4af86639f7c1e1c9e2bc34cdb6f979
-
Filesize
152B
MD5cccdb04720e1632b3ababce0c0954ddc
SHA1627fb15e39972f5339ba623ccf2aacf616adcc12
SHA2564aaa61366719d6428b64217960e4c31bb925799dd75288307cd306a4ec833a0e
SHA5124af29420d1bddd88a5fcfca9ef860d2cd1f97b9bf295c16b522a33d2580f264b35b3a373a1627a1f3be80044162c8580f54efae2e55befce3de8915c916b5bcb
-
Filesize
5KB
MD54ae49a2650a468ce89e9ccf09b737213
SHA1580731268c80273efc1a014611e0ebaaad3bd843
SHA256050921bc1a363a5fe9877c21275cfc0bc2d8f43b4dad0ff808f170cc75a1ab27
SHA5127b1f0665004e42f1b9986b95bcba6b08c651216b6745e212341b48f2ef93f91bbd8644940a400781e6244df632f3b6bd309edf3dd779e52cd67341937a02cb79
-
Filesize
6KB
MD5d3b388b78f9cfaa6f475e25f70474e61
SHA1bd3bc4bff5bd1f34d45fb26320a1e1810361729d
SHA256af85265bbd3e5874b0d2b8ed58165870cc00bee49981fc61fa9ccb6f0404f8bd
SHA51229c51910600adfa41ab07b088c586ec17ba563c5b864e8693fa092e9a0e16404e8d342da95d94889a7276385faa3a2b5edced1a9e455ab74a7c0d26be6ce1693
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cb2dc401319c5d65d8d307dc7a7abe66
SHA1d7e1cd264e770cda275ec0b01cbf49bb8c3e99c0
SHA2563fddcecf087fc36cd2e0d329b243bf491f5ead64320c8413ac9b208d06e66b77
SHA512d54c05ebf5b6b0215a711e22984c7c8292464afd559df81b814c2b71083f3ec271a21db1246f6c949da40dce7f701a178f1f368f6388f32a0deb5e99a33fa7ce