Resubmissions
06/08/2024, 18:34
240806-w74q2szfrg 106/08/2024, 18:34
240806-w7wqfazfre 406/08/2024, 18:33
240806-w7lv8szfrb 306/08/2024, 18:32
240806-w6ltvazfqa 806/08/2024, 18:31
240806-w5952szfpd 306/08/2024, 18:29
240806-w5c6bazfmf 806/08/2024, 18:17
240806-wxa1zswdlm 1006/08/2024, 18:16
240806-wwsjmszdkf 306/08/2024, 18:15
240806-wvxrzazcre 406/08/2024, 18:12
240806-ws6xvszcmd 8Analysis
-
max time kernel
580s -
max time network
599s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/08/2024, 18:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Resource
win11-20240802-en
General
-
Target
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4080 msedge.exe 4080 msedge.exe 1440 identity_helper.exe 1440 identity_helper.exe 2300 msedge.exe 2300 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4852 4080 msedge.exe 81 PID 4080 wrote to memory of 4852 4080 msedge.exe 81 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 2328 4080 msedge.exe 82 PID 4080 wrote to memory of 4828 4080 msedge.exe 83 PID 4080 wrote to memory of 4828 4080 msedge.exe 83 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84 PID 4080 wrote to memory of 4260 4080 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4b9c3cb8,0x7ffb4b9c3cc8,0x7ffb4b9c3cd82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,13443851475541142421,11364185533968849131,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD56141ff17f7dbca46d7861035a7a324f9
SHA18fba796e5ada35de430f8ae0a5d9503c262927c9
SHA25668b6a421f0a9e45093110579eb199f03ee5400b766e8533eefb33ca439c756ef
SHA5122f3e4fc80c57ddd0df94df2e82b6eb963a1ab467c847b3937fba4a032d2e46c0d2dbb293403476139986df434475cb9a5d36a4f554ec91eed0a8c95e663f7627
-
Filesize
152B
MD5302c3de891ef3a75b81a269db4e1cf22
SHA15401eb5166da78256771e8e0281ca2d1f471c76f
SHA2561d1640e5755779c90676290853d2e3ca948f57cf5fb1df4b786e277a97757f58
SHA512da18e7d40376fd13255f3f67a004c3a7f408466bd7ce92e36a4d0c20441279fe4b1b6e0874ab74c494663fb97bd7992b5e7c264b3fc434c1e981326595263d33
-
Filesize
152B
MD5c9efc5ba989271670c86d3d3dd581b39
SHA13ad714bcf6bac85e368b8ba379540698d038084f
SHA256c2e16990b0f6f23efdcecd99044993a4c2b8ba87bd542dd8f6256d69e24b93b3
SHA512c1bc0dc70ab827b54feb64ad069d21e1c3c28d57d126b08314a9670437881d77dba02b5cca57ef0f2aa7f8e7d4d163fbd2c6f246ea2d51ce201d61a89015e8b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD58ab00245d889cb9b16908616ffd0a2d3
SHA1902e4817a982435fe0d2106646c4b5cb9c41c3ad
SHA256b8a21be7050937b64172afbb14ca17533f6ed756dec25b37fb81567f7a17f754
SHA5122d9c77b8cab95034f9b6460ac634659bc79ee8bc8393b3cddf4e90bcd44af1cd27744ddaa190420eb01d4dd48a479448d7080f669a30b83244ce88877e7172d3
-
Filesize
5KB
MD5b66a2452a852c13dc042987a04e96097
SHA1f055907832e35d32c3dad77fab9fea369ae2b7d6
SHA256f52180352d34fb0f5d8e243f41e8e895d6336a29ae7f73f0dca9fb9d369a8c28
SHA5128b0889ef4af0878e58f537a40a342870074b6ba320aa4bd336b95b904e3014cd5d45a7212dc5f65de21141d21dc9e3846c900d6c720bd3277b47cc08c5414fd5
-
Filesize
5KB
MD560cc885061ef17baf50aba4190dafd16
SHA1fc3bf0e536c96192d1233b84186bd7f35a20893d
SHA2562ee263ac22fb0cc2ed215bcc0abd86a8332d2cfd94071cc521920443aaea4dd2
SHA512a70270233fefff0c30ed33b117b4cc9801d6964e911fca6edc7a9c9feeb75422394cac4ed4be52bb973fd4ddb5b4e1ddaca81edd479c876b5065b4ae60342a8b
-
Filesize
6KB
MD560129416d99f9728fa5072dbc23c9c95
SHA139eb21cdf95c13b22d2cf24a10d2e9218899d041
SHA2565cba3abf19bb651c6c0394e14b82e9bf6ae26c9ac00802c73b3864222f147b15
SHA512c9868cf81124103206a7474f35770f651cc65cdc61e75bd35a736d881a0104cc716bb9a8419e58799402978188880885e9546f8c4a8bf55071979af096d60399
-
Filesize
7KB
MD5af830581e0d34cfb0379cdedff50b2bc
SHA1b44ec4cb4cfc13e1567dd7e7337394bb0fff4961
SHA256a02f9c1110ec6e07e54641189e6e254f240f4a13c7e83275a0337533269807aa
SHA51294e2fc5b33732881e36f31b163ddd39d7885cb7fed42d9e6c4e341a0a64b6c7b527ef3397c11a9f14be573c1c5e44c47b29d0f0801f6bfb0f9c6a0cfb94f3912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
53B
MD50ec81897849e4caafda351d85821567a
SHA1fdad2e7c7c1728432834fafc6dbf6b2d0df972a5
SHA2569409efb43669a071f8e5c9bcd7a2eab021ebf1352ca7d1ace133959b5a3f3a6e
SHA512bcdc29b9490504daf200ac5c1c2f99703d1828c17fa3f00860613acdaacb26d1508774a7920df577d3b4bfd82cd1a26435325577252697188473b4488c6681c1