Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 06:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cl.gy/XWop
Resource
win10v2004-20240802-en
General
-
Target
https://cl.gy/XWop
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 3092 msedge.exe 3092 msedge.exe 2888 identity_helper.exe 2888 identity_helper.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 1824 3092 msedge.exe 81 PID 3092 wrote to memory of 1824 3092 msedge.exe 81 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4256 3092 msedge.exe 84 PID 3092 wrote to memory of 4612 3092 msedge.exe 85 PID 3092 wrote to memory of 4612 3092 msedge.exe 85 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86 PID 3092 wrote to memory of 4492 3092 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cl.gy/XWop1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff927746f8,0x7fff92774708,0x7fff927747182⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2932709709588115170,742791032023419621,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
260B
MD5d9975725a9244154a810ac772fd89e4d
SHA1f2fbabe7627fb2b7744779fa133005722e596d2a
SHA256815b4bda39a2beeca5154f07d0d36e8ae1f9d97482d0ff366f456c83648a3549
SHA512b14786bb3591cf4f5bcb9040ed1760a062ff9b89c48513f1090422c7e868c08cf122d8c659de369186be2d721459b75696b04d47068622012dada510c650e1b6
-
Filesize
6KB
MD5335716ce060324b27acf6325c9f36c24
SHA198608a15e1a127ff4b21b03a8b6cefed472b7856
SHA256a7f7c2470e05a849d91d66dfad0df2a5389a53c0171fab0b4d4a2d129e1c1d74
SHA5129404986712ad8ca611da75cc1101e251fac604d3f9485dfcb3eb163d48f41530136629720b249b90fa03567c75738c419d0e338c7d7004bc8903643e0ed25b06
-
Filesize
6KB
MD58865baed9bc2d974c2f2857cd3c06f52
SHA18d56dd1eb26028d5973fae086b7c11e598da8c4e
SHA2569208ce6a4c1e132870497cc0b8f5a44899126543024dc6451fa8a50c92e9e18c
SHA51283c924b9ee521f8def09e07ad3578fdd82525f8ffeb0202a2e303edb38625fc7585c2d337c6c848bb5e5c15f2871ba91803424b6b9ebf35b0dc4f7ef75ca8d24
-
Filesize
6KB
MD59a268b02ac99483a44de710c46380d58
SHA191e7c48a99cdc7c88ca7d0da158264e9a4dab4e5
SHA2567ec618192e84063821530f845d22c5a658006ffa902c56d032cc89d8f1eb1973
SHA512466580e8790233b0d839ea5118c8c3065ee8c52280a852528dc80c2f678996547910e5947d219651f067dfde37777b751d2ab3c65af5bcb062a1b38e220d630a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54f3e28edda0717d9469e6277e8fb9ee7
SHA180d3e8fbaf8daa244b46c2b6abc42ec9a38a9e60
SHA256aaf209844c04c41f021bbc3f689e397249e76f96b6d43bf758abdcea71a9ac87
SHA51238ec68b6b8336aaa1733222f4f15bb745d4b9008b4d449ebad479e13959ec54e0727203ddef85f6b8c490f98332478858e572535a565385a510b32dd20de45a9