Analysis
-
max time kernel
21s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.facebook.com/share/v/Qmo9rR1dfXkFbWjw/?mibextid=WC7FNe
Resource
win10v2004-20240802-en
General
-
Target
https://www.facebook.com/share/v/Qmo9rR1dfXkFbWjw/?mibextid=WC7FNe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 2420 msedge.exe 2420 msedge.exe 512 identity_helper.exe 512 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4588 2420 msedge.exe 83 PID 2420 wrote to memory of 4588 2420 msedge.exe 83 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 4760 2420 msedge.exe 84 PID 2420 wrote to memory of 5072 2420 msedge.exe 85 PID 2420 wrote to memory of 5072 2420 msedge.exe 85 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86 PID 2420 wrote to memory of 2928 2420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/share/v/Qmo9rR1dfXkFbWjw/?mibextid=WC7FNe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe07ae46f8,0x7ffe07ae4708,0x7ffe07ae47182⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5594979778389206876,1714203196977041140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5d2dc87bbd15ddb8966c94851eed8cc7e
SHA10fb36851e8464131d2a4b19216e11445b65bdd3c
SHA25637386651e810096290d10ae2db03e33d899f09880d0b7154bc5f229d85e3d676
SHA5121c09a07cc62dc86ccfa2d6ed7c66db851f6359a688bfbb0ffaedd7fd59ee771c53e72522104ba77cc048a7e955a55485dfc78d4c6b2485e5b3cdfcd553a10565
-
Filesize
6KB
MD57452d85cf44eed94c46f84ced22a4f55
SHA16e2ee1b2afec7bdadaf7a0bb1d0d3e2b2dda7c40
SHA256c36bcc2a41fb8f13b9018c03f20d56a986ef8e6865ef8bdec83bcd012def5ac1
SHA51276c3327e3df4e66edfcc861c6c3c8f4b4184016a7a65a1095c00be947d9750dd3f111b0e0fe1f0b1e7c8912e6a00a232fc73f41eeea1c14d6e111e1c44490b3d
-
Filesize
6KB
MD5f736bae53912a1c8557a899cf6db04eb
SHA1417f2ed1c7a188608f6e86dd5f74daba6e949fc4
SHA256f1ac4b6b17dcfaa45c106a91ac686d7419e73db44810ca26838b7c9ee3b7467d
SHA5120e22a3977fcfb61d03c24c78b18f35d2106ca44744b0bf504efdaac29e14f1fc047d07e331e5f8977444b25bb76b5a6d4dfb1438e8cc8c9d002748b9c679a5b1
-
Filesize
705B
MD58727b5b918d0a113aed6c63d5215d2ce
SHA13caece02ddd5c52477544e313d0fe71f4a48f571
SHA2564bc5e3a51d605d903c02d10837ae823b8113c610f4e91e98c6cd8214e97181e0
SHA5123d6ee84bd5e2daf19f928bc937b03290086abbfa6bae79a0dbf935ab3d01c3d020cb4ad56471beeda6bb0713e060b2101bc753276af81d14590736516656f222
-
Filesize
705B
MD5d99f3e79aa723326543f0b64018142ee
SHA15c5b278cba5c5b85076dfdb7883fef7799c3ff28
SHA256cf7a9a1a6756a4c120791b8b66f485024ffba02521f1c1c393f194c5f995373d
SHA512ae8a29de5d7d9c7cebea9663a3bff7230f09a111101d1b4935bc9cab59eae1e5c7089269e260383dc19c53b9df036434007cef5fcc9deb59ffdd357952df932c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57a3462d63bb67fef664664bbe2c3c037
SHA15580a0a6daf4bd543385e44b5ff36373d424dc8e
SHA2567f55324f3f7a0e44815c8ad1e39f9b87f1ea30536d457e42e5e8594023cbfc9d
SHA512f43f5c61f12bc8a75a4e0df48fda96b82ca9b3b346ed15ef34fb50ff10944bd17b7dba35567015cf73a2e5e6ca0f749df634e3125f7c8414e53e7dc2283a7cd0