Resubmissions
13-08-2024 02:54
240813-dd5gda1amd 1013-08-2024 02:39
240813-c5kevazflb 1013-08-2024 02:28
240813-cx1rvsvdpm 813-08-2024 02:18
240813-crra8szaqg 413-08-2024 02:18
240813-crdedavbkq 413-08-2024 02:15
240813-cpp1dsyhrc 313-08-2024 02:14
240813-cn7ttayhpe 313-08-2024 00:43
240813-a3a3aazfjp 1013-08-2024 00:10
240813-af4q3syekr 813-08-2024 00:01
240813-aazj6sycjn 10Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-08-2024 02:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win11-20240802-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2320 msedge.exe 2320 msedge.exe 1644 msedge.exe 1644 msedge.exe 2900 identity_helper.exe 2900 identity_helper.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4628 2320 msedge.exe 81 PID 2320 wrote to memory of 4628 2320 msedge.exe 81 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 3736 2320 msedge.exe 83 PID 2320 wrote to memory of 2620 2320 msedge.exe 84 PID 2320 wrote to memory of 2620 2320 msedge.exe 84 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85 PID 2320 wrote to memory of 420 2320 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffacfa93cb8,0x7ffacfa93cc8,0x7ffacfa93cd82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1724,3267755579740282935,16911672540765724039,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52ee16858e751901224340cabb25e5704
SHA124e0d2d301f282fb8e492e9df0b36603b28477b2
SHA256e9784fcff01f83f4925f23e3a24bce63314ea503c2091f7309c014895fead33c
SHA512bd9994c2fb4bf097ce7ffea412a2bed97e3af386108ab6aab0df9472a92d4bd94489bb9c36750a92f9818fa3ea6d1756497f5364611e6ebd36de4cd14e9a0fba
-
Filesize
152B
MD5ea667b2dedf919487c556b97119cf88a
SHA10ee7b1da90be47cc31406f4dba755fd083a29762
SHA2569e7e47ebf490ba409eab3be0314fa695bf28f4764f4875c7568a54337f2df70f
SHA512832391afcac34fc6c949dee8120f2a5f83ca68c159ff707751d844b085c7496930f0c8fd8313fd8f10a5f5725138be651953934aa79b087ba3c6dd22eaa49c72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD51e108d41e2e4823ebccb880b70646ed1
SHA1bd6738ff825a8fdab56f57c15f53c45f9fa2e9ef
SHA2563ab7e5070137cd7e7b7cec7d3b72552347951d04955d4b8eb2d32f94253f2d3c
SHA51296333d60aa1348871d28b141c4a665c334418a4d3feebd3736b9f17efd76f00ccb83789024e577ffa57cd039526a3ff2a50c9dc4df1cc45a10e2a135c2f05128
-
Filesize
496B
MD5f608725842a0185c9ee53fb7c5807e09
SHA127e5f3c3f7e1056cb1e555cbbf8190f2336c2f13
SHA25687226eb070e366b2f3c23900dbe849c7ad264ece26caf98d083019bfb0bbbc15
SHA5123982ef3e4ce76cce6986b574cff9b9d8e7e9869fd9a6ddfb7f1c8fbfad9ae9abfd5b1bc171deaf5d3d4f672a28a02db5414d88b5c2a44fe684d995b6aec22104
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5e137bfc24329babe91963b488bbbccf9
SHA1e116e857d11426f0448e6b9ceaf48e0a1bd17fbc
SHA256a1f1d948d9c71a5ae149fae6742f3dbd990eba0e6cfdeb4beb516c4d5cdf2774
SHA512fc7898ab4650fc0ac7c8acb4fea1797eb660dbf929b4efe5ace6c4d6d1d8dc0c1bd6d0496fcc11396b00f15f343cd836e5b89cce1b649776461362e0357c0194
-
Filesize
6KB
MD5a29bdb34fe61a9dd057425a58e8a5917
SHA1163a7faa00ea358d76519696729ee95450e1dea5
SHA256ec84c124ecb17d10a549c12ab506f9be6c204842c8dc514eb167aacb77375a9c
SHA512dd54bc7bdd5f1bf5ac999e2b0736135b4df86f339a2fb626b7fb2f7690cb086cc288a4b969dd1ac680c9d8583c6470d0ede1e4272d19d70b0048a82a3a78e69f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ae40affe5df1f4012ea3518627224107
SHA1405f1ebc3fee225a3eaf20ba7e6e7b273c1b42b8
SHA256b62934cff5261370fd2e37abc823bb98905898144d6375d6877511bb658b2877
SHA5125b349b363c6d08dfdcd0082112876b7f8f60d9f0d0cb47c64a04bea81fe1ec34546d54098f94f7652fcfdbaed29274f30986282ef53ca0f9b8a877fc8fcc249b