Resubmissions
06/08/2024, 18:34
240806-w74q2szfrg 106/08/2024, 18:34
240806-w7wqfazfre 406/08/2024, 18:33
240806-w7lv8szfrb 306/08/2024, 18:32
240806-w6ltvazfqa 806/08/2024, 18:31
240806-w5952szfpd 306/08/2024, 18:29
240806-w5c6bazfmf 806/08/2024, 18:17
240806-wxa1zswdlm 1006/08/2024, 18:16
240806-wwsjmszdkf 306/08/2024, 18:15
240806-wvxrzazcre 406/08/2024, 18:12
240806-ws6xvszcmd 8Analysis
-
max time kernel
480s -
max time network
598s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Resource
win10v2004-20240802-en
General
-
Target
https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 2656 msedge.exe 2656 msedge.exe 4376 identity_helper.exe 4376 identity_helper.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 4016 2656 msedge.exe 83 PID 2656 wrote to memory of 4016 2656 msedge.exe 83 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 876 2656 msedge.exe 84 PID 2656 wrote to memory of 4084 2656 msedge.exe 85 PID 2656 wrote to memory of 4084 2656 msedge.exe 85 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86 PID 2656 wrote to memory of 3624 2656 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://download2339.mediafire.com/s7wz84q67jagLz1e-SoTTsvxb-whPzStMkiFdvMm-vbPetC59GD6ICf1x9TDdReEM-cvpMMdVdK8NJPm8Jrv0A1SIeKtdr2SQp_hRQTw2axEFvAncHVLw8-8bbor6oi0Uhuu1PuxluVPcNgK-ITWjDHyOVzOFWGvI-1etXiu9gO7cFc/jmxcdbcpk7ml8ts/RB_scri%27%2B%27pt_install_x64_x32bit.7z1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdffd46f8,0x7ffbdffd4708,0x7ffbdffd47182⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,180194544101825509,4349534010919474057,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2536 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD56f5280dcd4199a90f3ea12b96b2b339a
SHA15d873da07619afa700a2d7f7872e60fb0e1b1ad9
SHA256f88ba0170ca2378f915e85208070f746f6e6ee435a2f3b0dadd06428c59934bd
SHA51203935e9bdd225ab883843e70a948e0f92f3bdba1f62e1b10eb53d86da15db7df58cf6d7df3bcdb661a71978975dc8c3ce0ee925f41d8d08468633fa0d3d6f149
-
Filesize
5KB
MD574151e9badb85638ffe0b3d4c6599161
SHA19acdeb775427c38b4412b7c3436609325d55662a
SHA256833cf39464962571fd87b79a5af66ae0a10ca219bdf8adea49d2206ff50c8c35
SHA512cf8fe7cbb77d719f0f96a1233820675703cff6f557ca5e9d74fb27ba39946e825a3d51d724a0b231f7b622bc92b20373dd095725e2c69a8cde8df73eb2b471d8
-
Filesize
6KB
MD5217acb23bbbb81e624c3a8589843fcf3
SHA1d6b82efa19fdfdd0fc2e07d0fd63f1bc4a71e822
SHA256f6b4970a0515150ebb882b2db86df59247109bf63451270aa7dc15d23e43a5ec
SHA512d9656640f811390939540ad454d14e7681376823b88cec88ed23761b19e1b5d834cada2c16fc51dc5a55f57937fc75e0fb89705f33eda255d7c8f13addcbf026
-
Filesize
7KB
MD55635425901d539b66a2c3c997a8ea05e
SHA17165c504ce3fae065b2945e6b86bb85f229e87be
SHA256c4f36af3ba0255ec06022f59987243845f439d625df38e69933730771fda778d
SHA512d4021e9a28c86f0a92172cfd7892b6b82c461b7be4bd71fff0fe244d2c1a53a02093abed949fb23bad94a65891001f31153233d6cf49c108e67c5ded56cda22c
-
Filesize
8KB
MD5f9c6ebb3b80e02cc021671af5bb229e6
SHA1b09b5edf623881f5fab2ccbfb2f4d11f4c982639
SHA2566c32e155a06908e9366832de6cd91deda2a24b27d390be9ff63998c266581546
SHA5128e5217ab6adda7f518a4f26b11ec86ee1d7407cf4595359eab5e84696a06635cfd1ebe884e218c8a3da551913bb2bb8b9eaf8c6eff9e8014248c5dffcce40d50
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52e62f8ab1ec30e54690a53ec378b2d2b
SHA16e43e09095974a01d2583accdeb16d801a7fd260
SHA25624ec82c628cecd93086d5359a5c7a9e21b0fe3eb673ea75c9bb3ccb791965cff
SHA512f006c6b6b16f5c03cb6c7b5d8fb96fe038228c2621e1c0aa7395bb57bfaa1638bae09a5c6da7df5cd78746082d2e3b5d105892c32db152c45225cdacc63de55f