Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 20:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://zip.lu/3jQBL
Resource
win10v2004-20240802-en
General
-
Target
http://zip.lu/3jQBL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4268 msedge.exe 4268 msedge.exe 3148 identity_helper.exe 3148 identity_helper.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1976 4268 msedge.exe 85 PID 4268 wrote to memory of 1976 4268 msedge.exe 85 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 3712 4268 msedge.exe 86 PID 4268 wrote to memory of 4488 4268 msedge.exe 87 PID 4268 wrote to memory of 4488 4268 msedge.exe 87 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88 PID 4268 wrote to memory of 436 4268 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://zip.lu/3jQBL1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9d046f8,0x7ffba9d04708,0x7ffba9d047182⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,3545581841054192677,14103690578654834961,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD51a04819737cb1cdca7ca69be6661640e
SHA157ebbbd9341f311b00e710af76de165cbd805967
SHA256f1d6122f1d28c05b0d3eb1cd7415f2f2fdc8a5f2e87b9341b1331e05b1a3dc20
SHA512592e4adb661cdaffe88fd6286773228975e167f7deae35bfe9d1931cafcfc5017e8ca02af42e9aa87ae1c0e2babaa29b45fb4bb511f7ab9cfc2460c747ca8862
-
Filesize
491B
MD5097488c6df892286920cefcf55152c36
SHA1dba5bfd11bf042ba8678a0fd23ff69f56672a7e1
SHA2569a7b0d2e50e4cc0788994bf20cf2c1c63f6372ea0c3c31fa907d3fe3a6760446
SHA512b6a277c0a6f8fe4243c7859cf11139a5504abb7a2c8559b567d477da9842125885cc2b1b674204ce3bf040ef6989af298a266a4c91a31013d41ad5b1a41a5763
-
Filesize
5KB
MD5c17e4f6cd4ee79cd077b6c39abba72f7
SHA1ba9724ca6981a3e12a9155d9fc1073516410462e
SHA2560ae813bc9bfe927818d2280181efa97897a6fcd0302ec0a07d5ad6588961c800
SHA51266796e5bc41cc28535f57d3b8793ab341e2e4e326d2bcb728172a00f1b78480a3c76b070a88d89eab569e65520ae55467cecf750f9484938fe49a56b347f715a
-
Filesize
6KB
MD5291b24550e9daa1cefeb89d9f477dd74
SHA1e997ea25017a272383a49883450d139f58e397f1
SHA256076eeab2d0a65abd9c9eeed341ab18831fe07a280e96d2125c85abc857647c34
SHA512150b8717d888c478447e3bd31dac418b3727d784128107d70a7f08bf30ef53f0598713e5109b8a3be0f1fc37927340fb2dfa9db5ce9a3bb2d8175bf6a3dfab84
-
Filesize
6KB
MD5d2b8419243a811860fd0e2b637ae3709
SHA1051c3012c012b962b4335f0a7d78892db916fc0b
SHA25610520727d79a7d6e33d60ab5c468d11dcfda94dfcc072bcf004998f735ab52da
SHA5127b696eb3f351b0be45200500ee6397b7784f9b4183629bff52a7bc67da1162d53f585a7b191982d2047289de3b008f18b027fc881f81ef198e009b7467eed37f
-
Filesize
372B
MD5bbc0eae034616512ca90fe06c8ec1b4b
SHA1f196862d1e29bc31f759dbe7910d5b1a9ac95fee
SHA25662dd3f0275d127a42c6f68a1b57855c009c46505888283dcc7005399809fbb1b
SHA5129be1f780f675bf29a62f86b53466b8995fa3f4c1296c7fb42e553cb3e86c50c8f0316752edaa76d3fc210e3cd7245bffe75588a6b0ac5e0dc21f22a7d2a35acb
-
Filesize
204B
MD5e8ac6ce35159e9305bd350e9b4bb9cfb
SHA1be0da94dc8447110cb90522cc8c380d14d5e7fc7
SHA2566c766b0ecd20226d1d5980099ee222876f32c4abf1201e723585633d9575b68f
SHA512ef5b199d4c50b91f86cd645416768d8d574e86bdc5d8f20117ba3d27c88dd1224d6513ffd710717d2ad40b6d672e311254f6b1c437d3c5ab70ddd249797866e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD543591ff8478ec5777be8aff16155c212
SHA1ab3fae7e2d06093961d4e23a1a0200f951f107d0
SHA256c1f58414bc56c2de606c188a034cb4cd0a2fd44cf663fb245c997754910b780e
SHA5122de0861d759e2fdc72ea8d8dcc4f571f4ef5b53aee05022ee957d8fc9c0791d559c2023c2ff7df5ca76822325cd039150a0b8636208636f617179bbc2ddbd763