Resubmissions
06/08/2024, 18:34
240806-w74q2szfrg 106/08/2024, 18:34
240806-w7wqfazfre 406/08/2024, 18:33
240806-w7lv8szfrb 306/08/2024, 18:32
240806-w6ltvazfqa 806/08/2024, 18:31
240806-w5952szfpd 306/08/2024, 18:29
240806-w5c6bazfmf 806/08/2024, 18:17
240806-wxa1zswdlm 1006/08/2024, 18:16
240806-wwsjmszdkf 306/08/2024, 18:15
240806-wvxrzazcre 406/08/2024, 18:12
240806-ws6xvszcmd 8Analysis
-
max time kernel
480s -
max time network
598s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 18:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Resource
win11-20240802-en
General
-
Target
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 920 msedge.exe 920 msedge.exe 4932 identity_helper.exe 4932 identity_helper.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 624 920 msedge.exe 82 PID 920 wrote to memory of 624 920 msedge.exe 82 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 1292 920 msedge.exe 83 PID 920 wrote to memory of 2196 920 msedge.exe 84 PID 920 wrote to memory of 2196 920 msedge.exe 84 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85 PID 920 wrote to memory of 424 920 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae86e46f8,0x7ffae86e4708,0x7ffae86e47182⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11970238943764290957,9847310583811833609,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD52218b34e47e8eb9c6cff1ed35d6f7861
SHA1706687170c726539ed27136537f4d67c557666c9
SHA256636272f1e0db0c28f47be0b1b8411dd12c6e411b4a358da8fec6cbeb01dbb6c6
SHA512533bc8fc2891bf889cdff8449a5afb91f7f545deae76f70a92222a5db8ccfd8041a5d21848ac67ca212319e9ce9e40faef1c679781a38693a90e0d86a2b3d219
-
Filesize
5KB
MD5ada6221349d9012564a0e0af7366d522
SHA19db4c07a18ebc5bda307e73e720ed220212630e5
SHA2567202c691df40638f054837a2e4d5d27979f56b852ab1a62d502a7cf831f23525
SHA5122ae599440bcf51a0b39330d186c8ac19df42350745db5c8e215e375b8ab32a6034ead990b73c13ebb2d0bfae4728499078ab5b9bb5f7908aa2047fdb438e1628
-
Filesize
6KB
MD5b280a394870d9af97e5c08ef20ef07f2
SHA12155275455c0bd0b41747f3da629f841ae807aaf
SHA256c7bea6096376563f8521168400d3720fe0b70c9d677924c870ad978484e73b9b
SHA5121d3e2c74b0936b70b00c63774e9a333ba2ed7e53ecf5d1d04b963ae563505e6b714a2e33a40d29875362ff86be1df9acdc2d919de39735741384f02ffdf59ef7
-
Filesize
7KB
MD5a379e903522c0aae5c8422c51a2715a3
SHA167660e46fea7e2b304a64370512b6999137c1762
SHA256cfd9c49da1503115d102f59e2e22e02dbc20c05b0654c15502baf8f7bd0a34f1
SHA5127a6d4cac0a588ce9440f2b3eac6537295c4dde33c314a3e01fef78bea0848493493f78bda87af540c35b64144868c34d2b771dc0a16c7652ccfa16af1b97f7e5
-
Filesize
8KB
MD5c05f0bdbdbef47d35349e9cbd6a87091
SHA1ea6a3ce73f17a80e219419cd9d60cdb33b8228b0
SHA256906e531d246a16e8e0a54e63637c5bde3675f4d7e98556b0c17ffa6881452573
SHA5128b0c20c7555a52f7f10a06e9e4f62a00c88453df750db9f9721c3e2761295588b1ff15d32fd3e91fd39cd9b519fc9b83a8ed89c2885bb3428bb1340a3963450d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53503a39ae2bbbbe8d3426ed4620533a5
SHA1627be69934b99c9cdf4682c68579c09c215ad186
SHA256106bd520b2ca2b63c2f4b1f183384e1a17f70cdfc11fc0cf2f3d6a8a648b17dc
SHA512b29719a533e5a7356150a61f98b87af1c538d4906b0052f446907e7915494bbfccb465f20b47c82504cd82205f3577631ae2a119e823ea0c592dd6ea86e9beb5