Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 16:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1218246518008709291/1282380244526825482/image.png?ex=66df252b&is=66ddd3ab&hm=057a88395400b0023f1368074aa3427acb709c9a2d87035d85b91f548d448359&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1218246518008709291/1282380244526825482/image.png?ex=66df252b&is=66ddd3ab&hm=057a88395400b0023f1368074aa3427acb709c9a2d87035d85b91f548d448359&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 4200 msedge.exe 4200 msedge.exe 1628 identity_helper.exe 1628 identity_helper.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4200 wrote to memory of 4996 4200 msedge.exe 85 PID 4200 wrote to memory of 4996 4200 msedge.exe 85 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 2020 4200 msedge.exe 86 PID 4200 wrote to memory of 3080 4200 msedge.exe 87 PID 4200 wrote to memory of 3080 4200 msedge.exe 87 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88 PID 4200 wrote to memory of 2084 4200 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1218246518008709291/1282380244526825482/image.png?ex=66df252b&is=66ddd3ab&hm=057a88395400b0023f1368074aa3427acb709c9a2d87035d85b91f548d448359&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb91946f8,0x7ffeb9194708,0x7ffeb91947182⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,15000184882614553192,7628491553273925905,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5452 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
476B
MD513e3f205df07a233dd74f037f040a52f
SHA1032bf71df2a50c7a78da1e80b752ad4680841827
SHA2566ba4ad9428048f24e1e41d153f47e4f099f134ac69afded9a4a6f5a3afc9f6cb
SHA51246d9a8d17c5c3c413990297ccdc26629019103e19deb98f039294201603e228e9f260ae2665310630506ed7ec56635e43bb13a6548d136474867448bcff4cb01
-
Filesize
6KB
MD50445f66b46d3d0fc315d6b29ecc6b5f1
SHA1e2d07653a935d11b59393a509a85fe92a59a02ba
SHA2569d4bcde25b1a3f88982ed6f3d4b2b79f63c321feb90ee03285c286ab684f0acd
SHA5122ae13b81dea969633e2f64c2fa84afcfdbeab0c515a7cd0b80d7fd64c0b3aa4f60133c48671780f33d2d51d04574f3bf50a8a6b720e28291e7e302149dc6bd12
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e6b03243-abaa-4657-a204-8a245ab54b8f.tmp
Filesize6KB
MD576bad2702d139176d2b9e38d715848df
SHA10cf4402471dde0318b4be1159a96a1a292ce8a3d
SHA25643a7d08935834921d5903edf89672f428c4dec21e44d1c755cf759826adebff6
SHA5129cc4bf4d6d6cedf1b462a21d8cf03841dc47b49c14ca62f95391f9cd8697789fbd221623a305914b865845b74d1385f799fc0b83bf8414505b0c9833ba5ebcca
-
Filesize
10KB
MD576311a0bc8ce17ca3205697810cbc987
SHA103a930102bd6cff3a56cd07f5bb481b52c95cfc3
SHA2568722e47a7057b04d0d8ab3160254414d6dbaa22846a8eef52a9a753a263bf0fc
SHA512b19b6649c72354460c92f63d73c1ac5cd570b5d761dab342f73349e4aedf9f2bb937a31fa4f45461cb60cce77676862e31ee81eb3691e27a4c64a342876e0939