Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.md/url?url=https://rcqiiktqpuwikh&mewp=skcitkez&bnppbhy=ax0&iplxhq=bnppbhy&mewp=skcitkez&iplxhq=bnppbhy&uwikh=rcqiiktqp&axax=iplxhqmewp&q=amp/lu6hhpg.et%C2%ADfn%C2%ADfkmc%C2%ADw%C2%ADy%C2%ADq%C2%ADexhb%C2%AD.com/bwyjtw6kr&ax=ax&asz=mewp&uwikh=iplxhq&bnppbhy=skcitkez&rcqiiktqp=axskcitkez
Resource
win10v2004-20240802-en
General
-
Target
https://www.google.md/url?url=https://rcqiiktqpuwikh&mewp=skcitkez&bnppbhy=ax0&iplxhq=bnppbhy&mewp=skcitkez&iplxhq=bnppbhy&uwikh=rcqiiktqp&axax=iplxhqmewp&q=amp/lu6hhpg.et%C2%ADfn%C2%ADfkmc%C2%ADw%C2%ADy%C2%ADq%C2%ADexhb%C2%AD.com/bwyjtw6kr&ax=ax&asz=mewp&uwikh=iplxhq&bnppbhy=skcitkez&rcqiiktqp=axskcitkez
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4072 msedge.exe 4072 msedge.exe 2956 identity_helper.exe 2956 identity_helper.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4072 wrote to memory of 2468 4072 msedge.exe 82 PID 4072 wrote to memory of 2468 4072 msedge.exe 82 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 1924 4072 msedge.exe 83 PID 4072 wrote to memory of 4700 4072 msedge.exe 84 PID 4072 wrote to memory of 4700 4072 msedge.exe 84 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85 PID 4072 wrote to memory of 2408 4072 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.google.md/url?url=https://rcqiiktqpuwikh&mewp=skcitkez&bnppbhy=ax0&iplxhq=bnppbhy&mewp=skcitkez&iplxhq=bnppbhy&uwikh=rcqiiktqp&axax=iplxhqmewp&q=amp/lu6hhpg.et%C2%ADfn%C2%ADfkmc%C2%ADw%C2%ADy%C2%ADq%C2%ADexhb%C2%AD.com/bwyjtw6kr&ax=ax&asz=mewp&uwikh=iplxhq&bnppbhy=skcitkez&rcqiiktqp=axskcitkez1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffcd95346f8,0x7ffcd9534708,0x7ffcd95347182⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 /prefetch:22⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4040 /prefetch:82⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,18331694454955523350,2902824243793458403,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD508f43f413bf3783eb9b40c7f73bcf618
SHA1d591f08367bc958ad4d238aee295c17cfe8a6a3c
SHA2561b14df418682ea46ec3a5b7743f10f217307e26d3ba89d9a1f51765033817a3b
SHA512aef60223e6aac7991a45c765f80d455150be1cf3994ea332149f196ba5121a6fac728f624fc34c065420efe10abd34d7aaab598311b119ac5477a04e4b8cfffc
-
Filesize
1KB
MD59fd412371a486bdd18d20f77b50b47da
SHA112b7bc2a916249dd041b1cc7611b687e37fb9d42
SHA2565d4aaa9517422a9365c20a4e8e6ecc3861402ae189e3ff72c33a28fb62f637e7
SHA5120e36ef56fb50c7a3ce9ae2585608dfc9a66027e6c70cc3303d89926bd13cad5e1a17e2fe930ad96a7d3deae0d69bf1f6593e1b31336161719d887f3be89c2df8
-
Filesize
5KB
MD59225bae43a355d4d60624b2dfea4ac11
SHA152cb212ae4de366b844a166317fe6fb7dffa1389
SHA2566e957610da98effa753090c0764ee05b4e3429369afad1aefbb2d5fc836d55a7
SHA512b839001fc55231999f3476479d563a86fdc92f0a8333dbca1c04c36747513d01569cf9e4bcc9b079db7569cdc9f9218165818d41d5bf20c11ed9d64a1feda354
-
Filesize
6KB
MD573d0b7f21f7f3ca3c005b093b232ba74
SHA1e08a9d20244417db32bb0e92173decbe819cb414
SHA256444155e3cf9847c9cb26ddbab2d3f1bb515d82f99dc3b04d50d2dea66e934b6a
SHA512d893f9b8e99f149ef494ca058fad7816c0e0c35e2f461163fae6c3612d9947b91196d875fe185b1e0b41a2640fab7eb456c70e71464c7ecf355ae8d290ed1a4b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f38fa2110eb1bf4cab1f089edf58daf5
SHA1e5bc144ec8339631ade32b8ab82498ee2b7dbdf7
SHA2561e50d304bc83a07f26ba771faaa586b97e9dd17123ea0220377172ceb5f57914
SHA5128431b3acf93d2a5260baeacbc92d8e9404d24afbf60c37e6f9598cdf8412180328e711ebbbd3fce2c558a976d90762989e00762017142e4704f62d92c5400a93