Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 12:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/channels/1239832148953792554/1266555940493332512/1268016319232741397
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
https://discord.com/channels/1239832148953792554/1266555940493332512/1268016319232741397
Resource
win11-20240730-en
General
-
Target
https://discord.com/channels/1239832148953792554/1266555940493332512/1268016319232741397
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 discord.com 2 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2077438316-259605770-1264560426-1000\{6CAE1D28-0B5D-4B7F-85A6-946F18F77286} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 1072 msedge.exe 1072 msedge.exe 3116 msedge.exe 3116 msedge.exe 3668 identity_helper.exe 3668 identity_helper.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 760 1072 msedge.exe 82 PID 1072 wrote to memory of 760 1072 msedge.exe 82 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 1888 1072 msedge.exe 84 PID 1072 wrote to memory of 4780 1072 msedge.exe 85 PID 1072 wrote to memory of 4780 1072 msedge.exe 85 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86 PID 1072 wrote to memory of 4816 1072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/channels/1239832148953792554/1266555940493332512/12680163192327413971⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fc9846f8,0x7ff9fc984708,0x7ff9fc9847182⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3512 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,9106608493880301297,4783636281965608335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554a5c07b53c4009779045b54c5fa2f4c
SHA1efa045dbe55278511fcf72160b6dc1ff61ac85a0
SHA256ff9aa521bb8c638f0703a5405919a7c195d42998bedc8e2000e67c97c9dbc39f
SHA5120276c6f10bb7f7c3da16d7226b4c7a2ab96744f106d3fea448faf6b52c05880fe65780683df75cca621e3b6fff0bd04defb395035a6c4024bb359c17e32be493
-
Filesize
152B
MD5d3901cd618f65d66fb0643258e3ef906
SHA1c9b42868c9119173ff2b1f871eeef5fa487c04f6
SHA2561f74c3d5f4d41c4d5358e63ad09f8cede236eb66957f9888f42abf98b238c086
SHA51289c122ea72ae3f26c94e34040e0f0a856506c8490ba36fce371a731b3f0588407c6356cca2ebea37ac829a67c2b398e298a64d5a72712172f69071264ca58e98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD523504c957a1c12f86bdfac01d921fbfb
SHA19e12cc49524daec669b07df1f0b461ef05fe1df7
SHA256ad4feee6422d33ce4eb3d8008d59436e6051d25a30afa8611573d9758df6f96f
SHA512022ae706ff6c95bd50e1923f0dd2530b74122db3ca873d7625a86f0a38a5ff72a888e7b61fb603f140c8503e34b369a582b58864c4ba9dc71f3e759bd2e8dbf8
-
Filesize
179B
MD5c88a3bc77002a075b95198522f195432
SHA1dd6ff073c9b7fa86d1a461013165a7251443e777
SHA2568f8c6061b94669fcf151b9f8f1c979a33ad38d597be893f375bff44ad1b3556d
SHA512e3facaf13afeab1a90a5c15f31288611e7af177fed3e4474aefee3560c5e1129579ea74857f5a3845b8f04c117e6c5af45c87df5d0b003e1259d918b7b0dff1f
-
Filesize
6KB
MD5ad4a7d7d8c52d4333783b6df787ee30e
SHA1e9f126ed471ab1b31a1ded30d7557e994c38d204
SHA2567ea35b26150ee07a21c2f11c495348f1196c7ba2ad688a75ebe15726e4d5aead
SHA5124df86d8ebcf8020dad7b0305f60a85d2b58a9f59a26497b8ef538fe9e8a112629fc5f86d12ebccbe821e03821152dd950f3ecbabccbbf617ff5de594e9f9c5dc
-
Filesize
6KB
MD50d14f66b49c35aa01e9809173499e351
SHA1cc4d64b6fb83ad1698b8361bc7faa85ce758bde3
SHA256fa87bbd55e06d0a5742292d0dd4563bce2e5bbd6b3839dbc170d6b20ee7cced2
SHA512207662cada7441730fcebe54ec60c35de1f97ede5845eda7e908550f7b6135cf4b2a8b21e0e47ce451a3d1c150154163e47dd3787be875946809bf5c4b14c728
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5ca1faf376062e75815a6b5ee7bbfd645
SHA1a5a12a02b6dbf49153ae5b2c6bd568c8d052abad
SHA25604b6f5fdffe2df2000068142c2fd080691b8991e312e40957575b8033eb30d7c
SHA512b5c8297ab7a76e0229410475516a0fc33de1f662d9439a37047a764a846edaf6d6db2c8c46964c0fb7957c0fea32cad1ff4ce5d6c3ed0b728c92fd4d46bc54fe