Analysis
-
max time kernel
1771s -
max time network
1790s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/08/2024, 14:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/XhQmEbTZ#6141Nn8kw_GYKHDaw1LjqkfANFxPVTH40EDlCV0Y_58
Resource
win11-20240802-en
General
-
Target
https://mega.nz/file/XhQmEbTZ#6141Nn8kw_GYKHDaw1LjqkfANFxPVTH40EDlCV0Y_58
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 4660 msedge.exe 4660 msedge.exe 3224 identity_helper.exe 3224 identity_helper.exe 3672 msedge.exe 3672 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4660 wrote to memory of 2364 4660 msedge.exe 81 PID 4660 wrote to memory of 2364 4660 msedge.exe 81 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 2144 4660 msedge.exe 82 PID 4660 wrote to memory of 4884 4660 msedge.exe 83 PID 4660 wrote to memory of 4884 4660 msedge.exe 83 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84 PID 4660 wrote to memory of 1884 4660 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/XhQmEbTZ#6141Nn8kw_GYKHDaw1LjqkfANFxPVTH40EDlCV0Y_581⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff75db3cb8,0x7fff75db3cc8,0x7fff75db3cd82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,11871602882688374410,15737608292771374956,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59828ffacf3deee7f4c1300366ec22fab
SHA19aff54b57502b0fc2be1b0b4b3380256fb785602
SHA256a3d21f0fb6563a5c9d0f7a6e9c125ec3faaa86ff43f37cb85a8778abc87950f7
SHA5122e73ea4d2fcd7c8d52487816110f5f4a808ed636ae87dd119702d1cd1ae315cbb25c8094a9dddf18f07472b4deaed3e7e26c9b499334b26bdb70d4fa7f84168d
-
Filesize
152B
MD56fdbe80e9fe20761b59e8f32398f4b14
SHA1049b1f0c6fc4e93a4ba6b3c992f1d6cecf3ada1f
SHA256b7f0d9ece2307bdc4f05a2d814c947451b007067ff8af977f77f06c3d5706942
SHA512cf25c7fd0d6eccc46e7b58949c16d17ebeefb7edd6c76aa62f7ab5da52d1c6fc88bde620be40396d336789bd0d62b2162209a947d7ab69389e8c03682e880234
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5ede9fe9d13a373e990736e637bd8f36b
SHA16c3642021fc31db409fc5d1a68457c5635919456
SHA2562352aef3c772048e848c3f1c163a3f1ee5302acd4d39acddccf02325527bf6d3
SHA512db85e28e5c22d13cfaf2e9044aefaf9be7f4df80e0d793b1aad90e83fc7be14249d39548df2df03f98954d0bc7548dc3775a2ff7988e1f7a2df0b5448530ee27
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
Filesize
5KB
MD58cc1b10801632f8184b87b1c1a68fd23
SHA13a57cb2e5a3924faf70ed1d216a7f0fcf67dabd3
SHA256c6cd48ce6a7be0eb66d4a3462a431c8365386e11bba5b946fa537488c4dec741
SHA512ecb8c1f314e8611e62c06213e602336f559cd714028f59bb3eb66dbd04e12c7a1535e9b872b202c0f3cbfb4390f11bdd82d28f9944f1f3664c067d8916dafc50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD551fcc2ba8a38b49eb081833e6d64ff23
SHA125a31190b043f5d2aa82d7d210f50c4e60e65405
SHA2568d20760019302d74185111238ee8ccf85f1f1d4c7cba8cab019d43bdc09fdaea
SHA5123a0a0a42a5c42f0ce982fc48821edc99cdde0dcc41591d157bff7775aae2055ef568f8cf577198696c437b100e2dc0f082ae80610b9367ea61e029321fdc8836
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582f87.TMP
Filesize48B
MD56c733328a89e36e7b72eb40c99747549
SHA14b247a2d6f3dd5fc91edc7aca864e3fa64f4bf32
SHA25626f9f7d7e4a4f4d261b532df6b19ce2b1a6f5eda41c8c4706958d8c64071f952
SHA512391858c5f16f5c1e51ae28b6993473579406c28c463976501fe2506621854ff7600d46d0fe7cfa19b86c8ac2176275fb03da17e4b10b31d4ea7554c0345f0433
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f4161942-a1c2-42be-ab8a-9c4c0296303f.tmp
Filesize6KB
MD56aeebac9892e6962b36f1781d63a10ca
SHA1fb861e30b50a0f66e2f88d1d4a47a0850c26f453
SHA256b0678b81e9dcaac43b975ce09ded89805b04df506faca27bf55d9e9dca962335
SHA512bc7af8c5e4b2cfe2e215682c78282b660c22ff9247153aa27b799840a0a0a24734b12a78ebe246b41d20401d6d8af3ea1fcf6f9ce001d844ad806f1d77cd1061
-
Filesize
11KB
MD559cd75700acbb281f4de1e28c7d68b60
SHA17f1d59e9acde8742de4ecf75c76c6848848a281f
SHA2567493fd757626f6c6ab4ed21ac4aa13951f177fbc1c51545f084032fb683de9a1
SHA512739dd811e6f466b6c1ffbdc08d2c951a032fa39c30912e040c082eda5a101ad3d886c7fcaed6496dd9075b80e5e798bc8fc55773bb25bef005dbc1ca388adb32