Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 16:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://fedoraproject.org/wiki/User:Schotty
Resource
win10v2004-20240802-en
General
-
Target
https://fedoraproject.org/wiki/User:Schotty
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 2236 msedge.exe 2236 msedge.exe 3188 identity_helper.exe 3188 identity_helper.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2448 2236 msedge.exe 86 PID 2236 wrote to memory of 2448 2236 msedge.exe 86 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3456 2236 msedge.exe 87 PID 2236 wrote to memory of 3404 2236 msedge.exe 88 PID 2236 wrote to memory of 3404 2236 msedge.exe 88 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89 PID 2236 wrote to memory of 396 2236 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://fedoraproject.org/wiki/User:Schotty1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeebe946f8,0x7ffeebe94708,0x7ffeebe947182⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8837797072933814849,5750791312668297372,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5c155cb7a4debf9a251db5a52c835609e
SHA171ff07fdc68095a62a261b4b8f2b77ed539d4a0c
SHA2561311833db025da5e18e61799f8c283609cd39ecfd871c439278c4a51799fd5b2
SHA5124e39c9bcc989e15698f6bb1308659229108ed50232a7a452611e9d9062e1417d5d24fe57c9f5b8280cec87a7283db530e65e4fac1f14b7e8ffaa208d07fef551
-
Filesize
265B
MD5741f7d5d5c0b6e9ad59cbb90b21182ba
SHA1125a938baf5a4610ba0ee0b1c9e5adde8840065d
SHA256f54d85ef92e215cfa0ea62e982ea238e1a54f4700b894fe54bb71cbce3af3079
SHA5127d20e0276b3a96116ada2be65a5fb7d6a6ac81f3cba0c94735e0be06f603e9c56ef28288a5c84705de583142c6074965dfa70109bf40b4ff0f8eb2f614a67479
-
Filesize
6KB
MD56b28c375255553cadde21a7f1baab6b2
SHA1e23be894471d336e31d501cf72fe5b198f46c44a
SHA2564aea5ed44e980fc59cfb9c7ca013af7afeb4b2dc953684fc518a5fa79e9d5a69
SHA5129d8b2ee34164b487ab0b0dd1161adec3327eb6e227b9f6aa5b3fd5c79893a6e53a2af01448832ec0660eefe9f44aa195eab00f559e6e7d22762f8b63ae06c504
-
Filesize
6KB
MD5498ba1f6e4491e9328f462a642b0d5a6
SHA164025cd04a0d9c0be01814fa1ab7903ffd18e431
SHA2564e885a5a324371c172cbad4c21cfd4b494b5aee9a676eef64ddfc21d754b84d4
SHA512df237de999513fb7fc375f57fbf241688415b0d9baa8ba125eb09e6e7b3275e793627ad5e6bb2176ad0437001fc422002b7558f8a71d67823f478e673864979b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de6ec5fab29ceb14610edfd2a36f6eff
SHA1779013b71debbbb8fd9f527d4c3f72c14b195abe
SHA256d30c1c7f8bd9eb4ee3eb6be7b3b80c788399703ba7af1af0bdd232e90fbe1286
SHA5127ed43ca100d453b46d73588bd336f8c3fd899831a1c41e33933c94915ae479f49f9e5a042a1d0dd01b7a7dd377720e4f07954271a469cf85ed15e35d0007f6b6