Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 13:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lihi.cc/QADth
Resource
win10v2004-20240802-en
General
-
Target
https://lihi.cc/QADth
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 2800 msedge.exe 2800 msedge.exe 2012 identity_helper.exe 2012 identity_helper.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1576 2800 msedge.exe 83 PID 2800 wrote to memory of 1576 2800 msedge.exe 83 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4984 2800 msedge.exe 84 PID 2800 wrote to memory of 4020 2800 msedge.exe 85 PID 2800 wrote to memory of 4020 2800 msedge.exe 85 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86 PID 2800 wrote to memory of 2960 2800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://lihi.cc/QADth1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffeb2746f8,0x7fffeb274708,0x7fffeb2747182⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2338034175642157273,11613511646612228671,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
244B
MD52566edb19b7c3f8ed3d7a43359e36453
SHA190f033962eaf901a690e84cba540cf03e02773a2
SHA2567d564b65057c491227a374094284a4d6194fbdcacca5d7deb8e3dd429b25e6a0
SHA512330b381443c7a1ad6cf84332eddedc308c78d898f6def1408ee2b009b3fa775dcfbaac0553ab0c220c47cea78228540203466394addc963ce0dc797640bd08a4
-
Filesize
5KB
MD5fcbae6fa8f8a0889f4ac16486113fd3f
SHA197955b7dd4faef1693c5578d024b68d2c8e0ba63
SHA256ec73fc45c22bdba99b8de625773c211887493009c392be9ef2daab2ab2638a77
SHA512dd678e8c4c728e6366d657c2112c15fe932188974b1325279a8eca3b7d1841b50c898d47652b958ab42ff390c4870d7a9d83326fa5b5a6506d56269b450bcbf9
-
Filesize
6KB
MD58927d79aec9408a56a02bdfd68af91fa
SHA17a046810ada2ec4ed989fd57b6c58b1034008da0
SHA2566a04b55687e043384a22b2ee585fc2336c50b46fc294816e51b31156e1d614fa
SHA51280e5a9cfbaf4be1ffab537e12c7ac7d2d956a260e44efb385616ab0ab01392c3116a97f772cf76f6e69635ccfdbe939ecb4a8622b7fcdbe7c5356f59605673c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b3a7a6083836282adcbc4e8440d5aabc
SHA1c2f021d894b03b2fc73c1072b6e0117aac255ad0
SHA2560291e41fbc55d6d8fa14cc1fefcdf4f734f574ae1f7e628e28b064c64575733c
SHA5120abc217bd6e66d97ff70d8237074456f45ff8c09b13cfa4300c853a8934aaaddd8c90949cc08a055845ef5bbea6d03825c32bc92cc78daeabf61aa22c9afa9ca