Resubmissions
09-09-2024 19:47
240909-yhlkaawgqp 316-08-2024 15:24
240816-stchvswbkk 319-07-2024 09:10
240719-k46wfswhja 119-07-2024 09:10
240719-k41z7stalq 109-07-2024 04:19
240709-exzwnswbnr 808-07-2024 07:13
240708-h2an5azgkg 607-07-2024 10:00
240707-l1l8ba1gqb 1007-07-2024 09:59
240707-l1e41a1gpc 106-07-2024 07:41
240706-jjdhqstcpg 406-07-2024 06:14
240706-gzq3na1blh 1Analysis
-
max time kernel
1752s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 15:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com
Resource
win10v2004-20240802-en
General
-
Target
https://github.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4532 msedge.exe 4532 msedge.exe 1000 identity_helper.exe 1000 identity_helper.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 3352 4532 msedge.exe 84 PID 4532 wrote to memory of 3352 4532 msedge.exe 84 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 2904 4532 msedge.exe 85 PID 4532 wrote to memory of 4304 4532 msedge.exe 86 PID 4532 wrote to memory of 4304 4532 msedge.exe 86 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87 PID 4532 wrote to memory of 5012 4532 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab75f46f8,0x7ffab75f4708,0x7ffab75f47182⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16692364642314556228,1907946665989532576,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD57bccdc5a5521e496875e2cb3c7cdc705
SHA1e4e85c94c29e6817f559c7775e3045060f95c999
SHA2562483438153622ae2618cddd793b84c06329d22b2aad9eba7d49dea5c1fea5cf1
SHA5127d0e62ae6b5c2a31e31e6a4991aa9cd9991c6c019728d57cee69ad115b45fa3c91c8367a90781001913419868cca9f25af9d5aa19e6e873642ddec0afd187251
-
Filesize
409B
MD5b12ee6b010e965ed924892682077404b
SHA1cc06dbdc7cf807fb8aa0f90749f5f07c2fcf55fa
SHA256fefc13d455791d6cc3d8bee48121ca6d7c21e147fd45c504f236bce95e0ea58d
SHA512b4178d1bc5b95dbabbc5dd1f902f2601b39904279d56b725a9c4aeacf9c27860c02207b1409298c911976540a30eb194c469f7fea64cb3a117755e57a56c3e1d
-
Filesize
5KB
MD51b844151ac3b2d29d152fa5101a826ba
SHA1a6a13be7d4115c7e4d385599330803b1695dca97
SHA256ac8634f4ba33d4b5c67daa51ffd8e942a11fb3c420c2d1e0b647b8ee5c307559
SHA512850fb473914084c07150051a01fbcde7794a3c3ac7060f02ea598456b53b377e76d7d9a19bf9cdc529a8e2a85727a3b78bfa26b6a638b873b7b5badebca88ca6
-
Filesize
6KB
MD5efee03b156bed0d09c9de9e7989da0dd
SHA13bb27f5738f86a7758af3b6ac552bbb15859b750
SHA25634320769867a05c919dff4e521e7f4b9e6452adfd235fc4453f1d3bc6d6d9b79
SHA5122055faeb3e64b621a051f47cd237d8bc4a3a643247d17c0b2c996a9fd6611b8380c9666a1a73461ecea09ac1a8e523fea4535b6a6704b6acd624b606f8b11475
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53f03cb42e8be5a40461bfa8f920e8898
SHA142372afb5ee711b0766d827b52e1e60039ab0e8b
SHA25696e8b84b3a76ac1ef53a976ff7e4b2ef9996f8f987c797784931eab8585f0f53
SHA512e7c60de67c7e96e172b29b6c241e8ee392400b624de7628820587cca3061d2f46730303af72e190d6ee9a42cdb10be9f92c4780bd9ae7d681a98fd903244abfc