Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 07:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1015185569384509504/1253669898828382229/watermark.png?ex=66c91853&is=66c7c6d3&hm=b06eca24439fcf7e2eb6658021063a098e04922ca0f884862b0ded44ff475f30&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1015185569384509504/1253669898828382229/watermark.png?ex=66c91853&is=66c7c6d3&hm=b06eca24439fcf7e2eb6658021063a098e04922ca0f884862b0ded44ff475f30&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3888 msedge.exe 3888 msedge.exe 776 identity_helper.exe 776 identity_helper.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 1788 3888 msedge.exe 84 PID 3888 wrote to memory of 1788 3888 msedge.exe 84 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3516 3888 msedge.exe 85 PID 3888 wrote to memory of 3792 3888 msedge.exe 86 PID 3888 wrote to memory of 3792 3888 msedge.exe 86 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87 PID 3888 wrote to memory of 428 3888 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1015185569384509504/1253669898828382229/watermark.png?ex=66c91853&is=66c7c6d3&hm=b06eca24439fcf7e2eb6658021063a098e04922ca0f884862b0ded44ff475f30&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82fc046f8,0x7ff82fc04708,0x7ff82fc047182⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1768 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9284916107836502273,7697058987783566996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0e3f30ae-6238-4f67-925d-2d8ebf36b739.tmp
Filesize5KB
MD5f1754abdb09bf7b42f14e04f4624bec8
SHA1e8ce505b7ff2defeed9feab00e218e56d6904cde
SHA25601453f2466cc8c6a6b7c12ce9b2246de1e18171c71b2edbbc044d31c77baf4f2
SHA512ea5dfdc40b2504af87b0edd8cb278cd3c25fb43c932812f3036046958e1dd745476c7b2935496d812a1aa71074a49e66e099ad45e644b893fb3d3c2d707e3c06
-
Filesize
476B
MD52290c500969b5d8a23533135b3ad6cb6
SHA105aa1170a21ef388fa25c22783732334955af49d
SHA256400fa9d97d62af2085d802c6890ad2e90cad175b25795bc971e41e13edaeaac3
SHA5129ab00973512774e9bea3426a0385f1db7c6b1f3f3b0997e442ef20a8eb826538bcbd1a9369adc6721f33b037c855d90ff835d5f8a31b8fe567bc8869a2bb4504
-
Filesize
6KB
MD507409b7610fe62f81d677e75841f8e91
SHA16f34b96c2c0f83b1c40d7481a8d8e53d3ed37c50
SHA2563a50f9c96aca0b89207a6c8eb78cf8878bc2c2b04449189a23c8855331810d15
SHA51211e94d5b3f1bf567cfda0965a3ec921860c0472cc3b7021e33cf1ebe078a5c90d650bc433fba80fc00d87919262930f6c4c4ccde216c74f0128ed27ed6c12e90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52f20759fb0cf9ef491e5ec579c7757b8
SHA1c6260f4556f108c4811e8857f7e8e0a7a5c7ac64
SHA256a4c625dcc9767921580d6410a4eaa1eadff19fb8542b2b3204dddd56b0a5514b
SHA5125af267ad292ebc6c135dddcc452f0bffad1145d10ebeeb5964c836ffef4e2626d39f2711afffd1abe081e6d3f59102cd922f6c169ced7feeb407224385f728e4