Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
1000-Free-Unblocker-List.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1000-Free-Unblocker-List.html
Resource
win10v2004-20240802-en
General
-
Target
1000-Free-Unblocker-List.html
-
Size
10KB
-
MD5
84e1191bf40ba40133db0de70e25f43c
-
SHA1
4c64476240106508610b84abecb93ffb353024bd
-
SHA256
ffaab30d9f09191e9228913d45ae58be2ec35c9baf80c5724bbf98fcbdddc7b2
-
SHA512
c27383ae8e9523878c719ba0dd246176f85325202e9ad5560405c6fa3df2e0db5921fe4b56bcd0c278b671461b90b48fe186ee1dca947a5ff2449d690e0a8978
-
SSDEEP
192:0R6mA34QQQdi3YL5GfGUhiDlLub7q/f5xLJu:UA3Ptdi3YLwJ2lu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 4032 msedge.exe 4032 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2560 4032 msedge.exe 83 PID 4032 wrote to memory of 2560 4032 msedge.exe 83 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 2984 4032 msedge.exe 84 PID 4032 wrote to memory of 3692 4032 msedge.exe 85 PID 4032 wrote to memory of 3692 4032 msedge.exe 85 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86 PID 4032 wrote to memory of 3204 4032 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1000-Free-Unblocker-List.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc66c46f8,0x7ffcc66c4708,0x7ffcc66c47182⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2234022377442155765,7996344875291371064,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5324e14befa08df3028e4a24c7df64568
SHA189948ad8cd32a60df9416e3d40cbf0a89f2bc3e3
SHA256ad5381df65703204ca1abf781caa319348a917a391b9a1901d6d09ac08128200
SHA51247c1085ba7a6a5261f5345e5bd3a315f97f0168bbee0d07a9c34c87d9d44d537a1865f2bc97820e6a358023c82425de84b52655625c7280e6a64797afce145f0
-
Filesize
1KB
MD5956ca3bf413bee83a08a971ab8a85919
SHA1724a6ac2a501e5779891a8872b00057a04ba6443
SHA256f5663b5771b2f13e9d57e4354baa5c0d407319981ed4e020ecc6ba26663672e4
SHA51274c4540eb42190659dfd9e7cd3c5677f3592f8166a4036c3b81ccce8b9221ac501746fd03919e435358a0f7c3f8825e00128fb65ebb9a3c76b67973f8ea89294
-
Filesize
5KB
MD5c834555c118852e7aead20067db2a572
SHA16968de009de8b5a66f20aff1e31c0168fbcfe731
SHA256fdf084004670f3d7c81e9e9630082dadd3de056f11a70fdb5cad71f9c470e207
SHA512c0769dbbfdc11a623af8b477d8315d43747c23be0a65b4d1a371dbba53745e0057e91796860e6d8ce2e965dd70f80c5caabdb8ee6e7ff9e02738f39bfaa80295
-
Filesize
6KB
MD5a8fa5394a020574edc1a2b7410c4b61b
SHA16d8b4998ec1233e1e0f5c474d68d9f4d96d32c3d
SHA2564bc1960f4cc2614a601349052c535959f5715666c30cd1864a8930108644820c
SHA512f1fd095f4b0cdf57fa362ef7c6d95ba10b8b08bf29d25afffdeee6e44c98524507b227f421069d3dc65e11f24e0da262bfea0871a9faac0a78efb390cc8de942
-
Filesize
6KB
MD5e90dc51934a2d7cdcdb9741fd9546900
SHA1e95cdd674bd26fd38d3c7d131d63e2586d1ee7f3
SHA25648808fa15b600bebfdc377afb5cb26033e8627a43d166fb0819e382116252c73
SHA5126e072ccb13f0a03129db445911c6f14eb34fac7995df91efb68c0b5af1c1fa14074fc5078ad27f5b14f41d6f742e2419bbe60d4a0eda20092c27beab65bda119
-
Filesize
704B
MD594f540b670858d2004ab30ba4f02935b
SHA15f8a07eb8ffac9c3516804aa1eea22a3f64068bd
SHA25634f1f39fb029bcf9e69234f3afa1277bb5fc7c5c5e5394d0af55b1e14429af4c
SHA512d154562d09f28f216ac05feb45779f47bb7f0042a8b1b3f7cc1c62ad22b32b8d442a4802591b378515610a7dbaf1d4339c6d76261f20c4e1e11cf85fcf2831ba
-
Filesize
203B
MD5cbfb662f92500f5f21583e327ae87551
SHA1c3c6f759db5f18efb155cb6bdb5b534a1ed52f0e
SHA25692852e98719961b7626020ddca06a6a45ee01b3387b4ac983ff197f686769627
SHA512e6f084cfe7f36fb37970c68cfe417713c92ebb843ee2ef2262ad4e1f58a49c1e8533525d1bc3cc2206cbd8225354209d179c50c272e28cf350fd470cbdc78722
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dd13a2e7e477c42c88eed14250143513
SHA18f741d31326db168c1952f47213a8ebff9c01ade
SHA256fdcfd8f49fc1f8fad0b173f25f838414b064d39f5abf24e4e303626cfbb46958
SHA51233b447a4bcede452ccd84d65508bdf49c178fa0752b33bbbcb0f02d8d559b53c7a004aafb479685081bcf898d3e6f9b6c4403700134f264ab802abe7fb62ee20