Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 16:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://realbooru.com/images/58/d8/58d83268dd57f43c06c0e1afbf383316.gif
Resource
win10v2004-20240802-en
General
-
Target
https://realbooru.com/images/58/d8/58d83268dd57f43c06c0e1afbf383316.gif
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 4020 msedge.exe 4020 msedge.exe 1940 identity_helper.exe 1940 identity_helper.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4020 wrote to memory of 3080 4020 msedge.exe 85 PID 4020 wrote to memory of 3080 4020 msedge.exe 85 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 4060 4020 msedge.exe 86 PID 4020 wrote to memory of 3612 4020 msedge.exe 87 PID 4020 wrote to memory of 3612 4020 msedge.exe 87 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88 PID 4020 wrote to memory of 3048 4020 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://realbooru.com/images/58/d8/58d83268dd57f43c06c0e1afbf383316.gif1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8540646f8,0x7ff854064708,0x7ff8540647182⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1380824774934631600,377068490694815260,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
251B
MD5f7110ea8b6446991d606602060aaf446
SHA1aa0e1a9cc607bfddb05225ca038e576117704240
SHA256fc5603a41cf96ab609f4e9a782afaa535dc8d2e976ae00f84ae152463f8186de
SHA5125c8b1943a66eb3d0e8a7388d84939c293b501ff3ca5a4a6c614a15975917051179146d3099027dc26b97033a1e7baef0451b04536dc8bbef1f3ccd33a399bfb5
-
Filesize
6KB
MD5d00d4b43449ee6673c4746e223227c3d
SHA17ab70692562d7667f47fb83aec48c3bd5f190951
SHA256625f100fc4901e4c564fe41d6b008a8d98a1a3574dd6ba0dacb4b054bbf30819
SHA512ef16f08486cfbc0fdde5197d3a14eafc5253f6817fdf93e66ba5da459be6ea077513f7d5a935d420217c137c5dd04655ac7503e50314549e3f3b3ce6a1f92a45
-
Filesize
6KB
MD58c52d1298c13ad12e638ef2137af9a38
SHA15a91f477f2fd84974b9b1635d8a1ba7984619320
SHA256b475694c647de67b034fc64f867029981c90dcc50a09a43429d62b353557bf2f
SHA5121afd6e1179d03fc338596e17700fbac7c10ad6acee360b879fe98ad603bcada91a2cbfd3be755a482c615723f2b0da311fabba9d6bca407939261736a6e34c7b
-
Filesize
6KB
MD5c580b8363a4fe0ff9ff25fad4733c818
SHA1c30668dc45569d7232af44637eab85517551b41e
SHA25638e36855eb58c5ec342402b6d6c19096dae9bb84ccb25de782fe4ea4df7a303a
SHA512e350ade1ec072e9faa29b996e080a12b9489f2c19dee4df6d0d01a9160ba844dae6fdb854ffb612fd32c7af96ac9606ea862e2345a376eefe1798b1750b52e29
-
Filesize
6KB
MD542d833d4096b8cc62994057110e06e75
SHA1dfcb4908c79ea5224e09266e5658979de409e781
SHA25645e212c29efd27488ae000bd7b1188d4cd7b122c2fb83f353c8a014110cab289
SHA51268eab9b57f20bc246acb87bb7c435c0ae07a10c342ac33ce9331e417a29306f2e4b692cfd94570560658f8933fd3d0d678cadb76223db6ece45adf60960ba94f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f61c504383568f3a9fb5ceea4f9a1903
SHA1a4db4693185e2f6fd6c2e839a644f095bd6b6ec5
SHA25699d0403b11403bfa17aca899b227ff40817cd2c163b98690d996737557fd202f
SHA51200f1c0c9c1022508f39ab4070556ba376324921ac636325eb944d89f1384344b0552e6688f42808179ce58001391dd649f313919810d131f2b0373a3d401401e