Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 13:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/s/player/5f8f5b0f/www-player.css
Resource
win10v2004-20240802-en
General
-
Target
https://www.youtube.com/s/player/5f8f5b0f/www-player.css
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4860 msedge.exe 4860 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 804 4860 msedge.exe 84 PID 4860 wrote to memory of 804 4860 msedge.exe 84 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4156 4860 msedge.exe 85 PID 4860 wrote to memory of 4120 4860 msedge.exe 86 PID 4860 wrote to memory of 4120 4860 msedge.exe 86 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87 PID 4860 wrote to memory of 3968 4860 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/s/player/5f8f5b0f/www-player.css1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae52946f8,0x7ffae5294708,0x7ffae52947182⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,908269579072165172,6958980307423196285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
394B
MD5202e60a10407c7b424ce7b4bff8391f4
SHA187c046f6954d6784bb46df38cbe4028a4ad7c9ec
SHA256aca06e3b4c23ad5f49b8dc514058d330f456ad3f27d8dcc75aa9185a0bd4bd0b
SHA5123549f523581c452e1a134181114be9a176c6a1cc60012fdd0bbebe3840952d9b72cf7d7e64fd4c57540f6a8c502d1c1a2e366e776c6bb3fea626cfaabcfcd243
-
Filesize
5KB
MD56613a941b119e148c0bc6ac6d7219ab1
SHA1324cecd9f7b3fc115528d561efb12c78ff02d234
SHA256c7692eb961ee60201ff2eb99214e3ffbd05f1e6d9addd690b84975f5569cb7a9
SHA512a2cc909aa408d79ad9d5f5c6b0cbff0d79f67581d4356a11781d2120bc7df938b225a8db13b5c9847e328e28b541294c08df2c9154c30ac05e556edaa9725eef
-
Filesize
6KB
MD5102b30221078d24a2b10d1d4c1516525
SHA1a6d45149e672864e6e88e77bb4404f6c151cd16d
SHA25657bad06938723525df4326a1df82ab817a6e04ba63feba8188a13dc3c44e2ed4
SHA51241ebcd845ce9c7127fe2dd951f3e9dcfee7e6fcef88dc88c44b575e14d410cecb0bf95e26ee91b4165c00cd0eee4d29db908b27330a7850b24cbb3e0638be9af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD545e3e37de325ed8273ed43c9df231621
SHA1b7ce4fca8bc8182ca7c611bcef301d789f89addf
SHA256cfce12419bd1d0f37c13e7d4bb6f3c2e126db04fa42b25068c22fcfe548b660d
SHA512d3c59ef3f4b229651b3e41d5041d019727265e9d7e7955ad5945662b528a2c15ea952b7966449b1efd7541fda4d563f24b37ca5c331740a9cdbb6ce009136afa