Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 20:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1275550758682759259/1276719757478985818/exile_fear.zip?ex=66cc87ae&is=66cb362e&hm=643ec7cfb4cc726e05483813da9f31dbadeee64e29a98b3caeefe0954f36f0b9&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1275550758682759259/1276719757478985818/exile_fear.zip?ex=66cc87ae&is=66cb362e&hm=643ec7cfb4cc726e05483813da9f31dbadeee64e29a98b3caeefe0954f36f0b9&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 3980 msedge.exe 3980 msedge.exe 4480 identity_helper.exe 4480 identity_helper.exe 3896 msedge.exe 3896 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3760 3980 msedge.exe 85 PID 3980 wrote to memory of 3760 3980 msedge.exe 85 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1012 3980 msedge.exe 86 PID 3980 wrote to memory of 1792 3980 msedge.exe 87 PID 3980 wrote to memory of 1792 3980 msedge.exe 87 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88 PID 3980 wrote to memory of 1712 3980 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1275550758682759259/1276719757478985818/exile_fear.zip?ex=66cc87ae&is=66cb362e&hm=643ec7cfb4cc726e05483813da9f31dbadeee64e29a98b3caeefe0954f36f0b9&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff079446f8,0x7fff07944708,0x7fff079447182⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3448 /prefetch:82⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,6907771281609599038,12852577640762519426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD58d2df83f6e05f5723f7b57e1517eae29
SHA11a9cc1df4965e3f27969094af4d5a580e258db35
SHA256be6511efeb00bc998fc00da7a281d4a7b4d7a6019f0323b4e57f6848334e0779
SHA5127116dd2dfe7797c140a1deb4322ad98560cfcab5f9d7f6317d3d60d30fdd944019a9c11687a967743f3566759a9800a851ca1a87641833dd969f9beb22b3715b
-
Filesize
6KB
MD51075e25c861cdf020f4ae49f59ce9032
SHA15b02625c0972baf4a231cf98741550812bc0ebb8
SHA256084183ffce88456d2f6f20888064450422583dd8e9b96f11f951448b14fbb7d4
SHA512cd472d06b2689b1419dfe88012c4c139b4e3762bb6ae064090f3c52f4a82fcee6c73b49f55f4b4680b75ab3d9509e277c2b5ff80b51cc0d679bda746dcc9c9c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57442c7bb7339c6a1c277b3143d57fa24
SHA1025a6375f2224db8635ac6af2edeb512a64c4657
SHA25665b88f31f76ed493957df42c2f0017a971e6d86e3d1217254af1b6fb6d9cc6dd
SHA51221e3c6ed2e3e35c15adb0656edf6d2f56c540ab8e4a43006a0916026bd1a1f78b8c996c60a6c0b2d14d1be4327faac6bb54a22e8d17fa2d2ed03927a50adc117
-
Filesize
20.9MB
MD57cd299bc30e6b92b8b18311c531d10bf
SHA1a3665ddf2c10e2a11b8045237ef2cfc81b37ce39
SHA2565741d3c0d5fa808b78dd042d4065e29b500f90841b37dfe4101351561b7fbd3e
SHA5120656e0c67afc5a6ee20206d82804587beadc7023607c1cf3d410056617144c481065dcf65e87be4fc3009ad5e9cf6a72da0c6a06a9757b3e7bf05f7825c3b88e