Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 02:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.me/+OzdY3gyRBWBhOTVl
Resource
win10v2004-20240802-en
General
-
Target
https://t.me/+OzdY3gyRBWBhOTVl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 5072 msedge.exe 5072 msedge.exe 3404 identity_helper.exe 3404 identity_helper.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2164 5072 msedge.exe 83 PID 5072 wrote to memory of 2164 5072 msedge.exe 83 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1648 5072 msedge.exe 84 PID 5072 wrote to memory of 1008 5072 msedge.exe 85 PID 5072 wrote to memory of 1008 5072 msedge.exe 85 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86 PID 5072 wrote to memory of 2720 5072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/+OzdY3gyRBWBhOTVl1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e84e46f8,0x7ff8e84e4708,0x7ff8e84e47182⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4132 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4320 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,6999909597721618883,12372789289120896936,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD55bd166b57c1ec29ac4eeb8b57a767296
SHA1e1fb336ed595b30738724804f65621f4161fa992
SHA256e51a16b1732f67f6e1bb743658c03679f59a06e366c8c9ab5c4a50dcfb261956
SHA512bbd200b13f4f79ebc2b1aa5138e40ae6efb631956de681eee1e41c76f43d2f6a11d0e73152ca5098afac2c2fcaae0f718a37943aeeee0d260968fbdf55c56328
-
Filesize
442B
MD5014262658969b02c176ab1ee65abd8e3
SHA1599b5ca59625fb1ea919cb4c3da4c885ebe3c894
SHA2569eca649c4f0f137663722c12965e0cce25b2d0903889e7b2f757751c38c2c3e4
SHA5121cfb9b9f82beea3201d00a0d9e4a373798c28882de5bd67e12b67d571294504767636da373147fecb2c3e934fb303b57dd60b6e498029890f7f75827c32ee92b
-
Filesize
5KB
MD5731b1f1e6ed2060318c450fb737c38a5
SHA14a68192468a69f3c83aa10177c7bb67445800988
SHA256a3a55b7064d1145321816438c8b91436676cc1e1bf02aa7b18f636d0dc41e60e
SHA512c5d2fe6557c0728d32ca9906380cc55a841f4b41b0cc9daa2f9ed543dcf9b597ca9334a464dd50132bb20fc75aa976f2915143250bfc4c2486009dd2bd3b9866
-
Filesize
6KB
MD5ea8fa92c12e98e2c941b3140a0158cae
SHA1505b4c221af5a440beb39c9634f33b1edaf066e6
SHA256edd80af81f16b77b94d41f4af2d9006d8a9af82be1dda869ad386bcf75a3b199
SHA51220f53ed94921d35353fbd9e4eaebf5dccae3d19fd88ae9620986f0046afadf7d3dcdab216918567dddf578a03b25de4866562e9d9a7f13fdbc31b7aa4d612fab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD595b161d362e06777cc172d69cad47ecc
SHA182790adc6221efb78ffc2fd03c7ab2581d7ea778
SHA256d965b695d37b31867c4a6382b0e26106944597366a1e834b4a39de7a1c39f5d8
SHA51239e201fbc2fa336926ba3d594d9131abb3bd6eeb30e0fb960d315b215596ede391bd168622139074f24acaa48d72f81741ffba76d9c7c97bb229f07cd03c70b4