Resubmissions
22/04/2025, 16:21
250422-ttvvwa1sft 711/03/2025, 15:39
250311-s35wrsxjt8 310/03/2025, 20:01
250310-yrn2rswqv4 330/12/2024, 01:47
241230-b7n1datna1 324/12/2024, 04:37
241224-e8645a1nhz 824/12/2024, 04:29
241224-e4ffls1qgq 324/12/2024, 04:26
241224-e22aas1qgk 3Analysis
-
max time kernel
1763s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 12:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1267410065145593918/1267412602447990826/setup.zip?ex=66a8b177&is=66a75ff7&hm=25889dd9dddcffc74a9bfa5301612c6e4360f1a057c5e7506ad1fb4a2463f0c4&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1267410065145593918/1267412602447990826/setup.zip?ex=66a8b177&is=66a75ff7&hm=25889dd9dddcffc74a9bfa5301612c6e4360f1a057c5e7506ad1fb4a2463f0c4&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 5064 msedge.exe 5064 msedge.exe 4532 identity_helper.exe 4532 identity_helper.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 3920 5064 msedge.exe 83 PID 5064 wrote to memory of 3920 5064 msedge.exe 83 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 4628 5064 msedge.exe 84 PID 5064 wrote to memory of 60 5064 msedge.exe 85 PID 5064 wrote to memory of 60 5064 msedge.exe 85 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86 PID 5064 wrote to memory of 4652 5064 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1267410065145593918/1267412602447990826/setup.zip?ex=66a8b177&is=66a75ff7&hm=25889dd9dddcffc74a9bfa5301612c6e4360f1a057c5e7506ad1fb4a2463f0c4&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb58e46f8,0x7ffcb58e4708,0x7ffcb58e47182⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,11357850102821332475,4993804535299573154,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
474B
MD5fe8916cbf971051c18f47df2e7efaaa3
SHA1b293d47618ed850b6ea1f2b6f2d569bf63582680
SHA25646da410cbc19f58e249bf2f715dbefc8a34ed9d692ddf20c4f543f1a96808365
SHA5125e3652d6c5b0015d6fd97d35c5b0eb561267e2fdae8c3338f722d3881f8394cccc24e70a1d984d2cba64b2575fc596658e6c429080ec08e1ef6886fe4e9344af
-
Filesize
474B
MD5191b6df5de098a1d22b81ce5c5a85bc9
SHA1fbd320c604f9857db8543f6e07771fc8c237023f
SHA256658845b8c7d2d7789d4e782bb7afc83f9ec7a9e5a2b205a7bc084629c83cf4ca
SHA512cccda996f9ba09962669048932bf8fe6685c84dec1d84c3e720b4b77281764b08f04a0581279bfea5b055becb9f59ba50c683aa4cb7fff0c0cdf58cccc279530
-
Filesize
6KB
MD59adc55c1d3d8f58511d88f046377cc3b
SHA1594b9ca7a8ddae3aef50c6853496c16eb6d2acb1
SHA2562410cd740dee16b0062753ae7fb767f2f1c8b8f6cc1c7f5a638b3f7449538e14
SHA51296eaa275c8132fae86904eb634eb726de25ee26a35a41d34b0f44e9cf2b03bd6dd316562de47ccbba467a68837dc2ad80001f39d147e468bc5a395b010254b16
-
Filesize
6KB
MD5d0ac60b61ddc2777ce1c7bcb5af6a79c
SHA1cc70707c2b09e19188edf734905515fce65dd1bb
SHA2562ee60cd8384dee60b7515f3a7d2948f858ab837e1da3371c1a40c219abb233d7
SHA512a43a0e5a0088e97076cd54504c8afc0553a3467bd197363b8849e36d0f7001de4a15beb30aa4efdc560ed4e4532284b3c1f042aca5c2625b34fffa2efc2b3fc9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51122218733ec24627edee3e8f8941e88
SHA1fd536b908126825e7beb2529dd533d9a712225b8
SHA256690a1348ff64ecc50a38450f4a5489bf221e646c21e67f7921af8299bb4fc152
SHA512fd3788bd7472ebcd29f6e801a61915c5c2a85608e78c5ccdd35593d83c28323ae0e958f7ac8942e632b99a4436f81759a6e4f28726f526f9c5d919a123d6fefe