Analysis
-
max time kernel
600s -
max time network
614s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 13:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lootdest.org/s?ea3099e4
Resource
win10v2004-20240802-en
General
-
Target
https://lootdest.org/s?ea3099e4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4596 msedge.exe 4596 msedge.exe 5012 identity_helper.exe 5012 identity_helper.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 4604 4596 msedge.exe 84 PID 4596 wrote to memory of 4604 4596 msedge.exe 84 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 3632 4596 msedge.exe 85 PID 4596 wrote to memory of 4860 4596 msedge.exe 86 PID 4596 wrote to memory of 4860 4596 msedge.exe 86 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87 PID 4596 wrote to memory of 3216 4596 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://lootdest.org/s?ea3099e41⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdeab346f8,0x7ffdeab34708,0x7ffdeab347182⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16869450847687958527,1905815986484928866,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8589cfce-d7f9-4eeb-9a64-75201d2be427.tmp
Filesize3KB
MD59596135e40aeb7ecaea009484c5be636
SHA16bdeff32e5bfe16d8f7f191570e2c2c5c9945a77
SHA256e849b18dcea38ba7bb97c528de09c3f14ff8b0efaa00834fac360aa34cfc54ed
SHA51274f3e32ae88b885eb568b57bd65c55e06e4400d6529bae457580f639c3fc994aed86d756f2578541379aa5201186219f90e6007b7215b9e8b7a0873f376f2d64
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5e235889325c366f74967419edf361adf
SHA1234ec0970e2bb8705bbce93cbd259603b1d6a76b
SHA25699fc6ce8454496ece4ecb35c745f75a4f0aa6a7cec10b50670f4ea9f22372067
SHA512adf2043b08056c3b3a669f5ec32ea7364052c9b186d32b2f09df450d3077d966ac3f891bc41309b5d32289a29e3c63a8be9271e2214caef3bf7f7417fecdd1a2
-
Filesize
3KB
MD5ae5cae9a88e670c32290deae9ec11aef
SHA169adb9fd18c4d5c3dfc2f9c4c60fc297352f4e6f
SHA2565adaadb0911dd98a0cb75432d142b84ac4b5824410c7d4080fa44eb099bd2203
SHA512bf3cdf324254ea2bbbacc3276a5bb57ee42fc2891686ab8a583f9572c6d494ea5e211169e2a0c2497e1ce08126a029bca60ff143cbad81de87df02fdf4853838
-
Filesize
3KB
MD592b8325d40c74aa9d4ba78802c9afea5
SHA10294a5d4d18f7475da8730277dc5c26a36001aa3
SHA2565704e628a72f010a53d33f6b4674847bf2dc053c747bd51996f860aa98f4043c
SHA512125403b28f8fbcdff65ddacd19d9a3c2807aa268dcb4336a665555046f0c215f82c5990a58bf98995853de02bba69418dc1723e36f81128828477e6b4413fd5c
-
Filesize
3KB
MD566b259b907d802c2b91f9ce0e48dd99b
SHA182b6d0e0904d4997b925d2636a08e01e0b43afec
SHA2568807e04d819cb53209089902df97dcf5efadd260de4fa4a02891971d03e419ee
SHA51228afad424f555288684c02fa98bbfc051e637ee4224c05ff70f6005c461bc86a17ea694eeeb647ad3a14f63c8e5f5cc7cc5c279cc94ccea2c8febc122b6b6dcf
-
Filesize
5KB
MD526e292c95ae708db7b5e7676a08736fa
SHA131813191809e52f7493604e5c76e4b9f6b385bd8
SHA25628abdb1fa5a0cc0531b9de2a9c2c42f62ad671da4c67bbd1a51c4f2a367d7805
SHA51249fd18aca1bd30ad4c43d3939e34e922170491f79e6e897825156a43f50a22788ee93076da7d7ed23b3b50124c0f9b8a7565e2291b0cd66e93da65ea3af802fb
-
Filesize
7KB
MD5cab8a5427a4e78406871b3c0980abe13
SHA1232b5c6fc3352afc6cbdd727160aaba6dda64c00
SHA256a1f50952914f7afbafbec066f585819ec72fb69b6e04784eb12376bdc49819db
SHA512488c1cb52651e58ccb2004f77578b160c5abe1c7d751cea292c40412336040bb1bc3c58faae4b0e0ab242ec21914cb1d3f3b2bce305c2d918b887d382802dad6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ca5cde53287582176f44580b71c46f7f
SHA1ce1161ca06f1c2ded203a571bb646e80b669dc84
SHA25646fac0e3a22236463cd3408e8809c04e93e503a387b0bd5700af1ac884732970
SHA512a9e41e49776f869c6d254b1e25e28f0c8ee624c441117db291b194472689a7421ed6762d6471471b4736ac08482f391df93ec7e78481082a3a7d3389de37ab3d