Analysis
-
max time kernel
62s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 21:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/ZuckerPlunder6850
Resource
win10v2004-20240802-en
General
-
Target
https://bit.ly/ZuckerPlunder6850
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 1468 msedge.exe 1468 msedge.exe 3508 identity_helper.exe 3508 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 5092 1468 msedge.exe 83 PID 1468 wrote to memory of 5092 1468 msedge.exe 83 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2856 1468 msedge.exe 84 PID 1468 wrote to memory of 2276 1468 msedge.exe 85 PID 1468 wrote to memory of 2276 1468 msedge.exe 85 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86 PID 1468 wrote to memory of 3528 1468 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bit.ly/ZuckerPlunder68501⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9d046f8,0x7ffba9d04708,0x7ffba9d047182⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2896 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15916574367556965746,14473515475783299005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:1936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
1024KB
MD551fa35dd130c870c5b7311585348c79a
SHA1bf8574989f069af13d5193af2ffee5e5deea944d
SHA2565ff69b08abd18b568727561a05d645089310708bf7bca6007bd30cf7ddd003a0
SHA51278fba13863b482f2445315827e8cada292a152144bb27bdb5a93ef16f5eccb90fe970678988dd4a2bc5c8c27dd4274511cb9aeed9776f8280393eaecfdba3bd7
-
Filesize
1024KB
MD5c7a5189e6351f82776972a75a0c68cfe
SHA10d6ce298890fe081aebc5a01fd420c10a3bf04d5
SHA256e8bfee03c9a40afe427e2122e986e906c065acb2f40cf895f32ed54043aaec5d
SHA5121584e38f721f0f90269c3a90ac6000c0df3e1ea6ae7be9e41d55528124d20d5e7e383a9117364fd64de95d9b66489fa6453557276b977615fe2cc310a84eadb0
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD533b6e241479d31599860764817a3fa53
SHA1d1be347ca46af835a19f8e41ad1c216721c6af2b
SHA2567f38d25ce59764caa72f25acb642a00d47f35db1619e8755cc8cbb12389808c2
SHA5122212b1f341648ddf2a24e0bf7b9a7c5051c1367a38306b3f6529cca8d905b9661c66f11b3c28712a18477601efa1278397adb7b335c2088353f603defb104239
-
Filesize
1KB
MD57c341fecd1c502ad9f3ad7bf7099f60b
SHA1a5f5ca1763db3af85d0b0bed9dbe21d20100cc8c
SHA256bc7856669cb1473f0ca1f7c89e110e9cab7dc86dc45037ccfe0e9e3862acdfee
SHA5123231d8b2d815f441219e837cd60dd7595fcef7d78ea066b27abc513798202dbcb57d07c73d840045381ad644a51e6d05977d48f37b62ec3b9bd8c60281cf70a9
-
Filesize
5KB
MD59d2069a3eb7c14985198bc0bb71f4de3
SHA1521bfda84d9a93b33a249e826d15494109a69413
SHA256f70a40d9bf07e3293bf0a09089d073a8b289577c044216c87b2c0d288bf1f991
SHA512d2e00f8419f5b0811dffa343dac8999e665cc7265a6af2f496f1d52ce7749551f3e1b5c2730f5ae8a7079dd6858d177de11f0fa537740b8934f4ec5ed69543b2
-
Filesize
6KB
MD58f374af1ff10fc261875a12872b18ecb
SHA1f3148795cf56912630a1523c11e458c645e03aba
SHA256e62ac5a62e8f7fba9fd4be809512b7a4f055157008d4703cab4ac5556dc425dd
SHA5129cd3389dc865b3ed80c8027b465b5142ea2ab51eb31afd69f184dad6d66a0f376e833321cbfb2f278c6d01abbc54ef3c378a23e2b5c842d29634166350338279
-
Filesize
6KB
MD528e9d2ea8773a933174857997d743169
SHA1c8c166a2e0dbf333382a22c54e985ab985222db2
SHA256b2d5ca83f1caa70b4bb74da6cbe42b93e1a61555858eddd3eedfcdc242699f14
SHA5126caf990dd6c9f266c01dc3e83facc32477da380ba258baa2b78a4623b4b0ab501b751a835d648f481251712ff0604ddc5ea0be5e78bf6e093de9b210e8944d95
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD580cba1c98406a75829138bc94803456b
SHA196b199a00209728b1e35dcd49e1bb05115747022
SHA256086adddfcb37bd915e8d481f760eaab4fe16aa5c96a291a5f2d142893af0e114
SHA512882eaa8d2532239a97ec1beb25dc5db64326e8e8260676437b2d54f8a5f9dd57355ac861a2c353c016c97b2100923b822f7d3e89fa17f7a6cfbe1f7796316f4e
-
Filesize
10KB
MD5dac3e1eeabb370ced8d37aaba04a98c2
SHA16d842c0cd0e9c91edb8e6e69c7f73116e653bb4c
SHA2569ff34f1fa920b14f1f4c6ae5141084daf2ff09d35b9416292c77aea8c2b30b41
SHA51229cc5f399b631ab76bbada717cc21460a38495e73b0f17e32d71a9d4e5db2aa25b00788e387387bb2523eab28d6725c15f7c656d5bfa9580c8e6046de7b49406