Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 13:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://login.onefile.co.uk/invite?token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJLZXljaGFpbklkIjoiOTA3MjBhY2ItMzE1ZS00NmIzLTllZGMtMjkyYzBjMjhjMzJlIiwiRmlyc3ROYW1lIjoiRWxsaWUiLCJMYXN0TmFtZSI6IlNoYWxsY3Jvc3MiLCJFbWFpbCI6ImVsbGllLnNoYWxsY3Jvc3NAYXZvbi1wcm90ZWN0aW9uLmNvbSIsImV4cCI6MTcyNzM2MTM4MSwiaXNzIjoiTG9naW4iLCJhdWQiOiJMb2dpbiJ9.ZoV9MnXCKhBVyJ5XsqCme7NvRWOQsaqitJsJHTp3TaY
Resource
win10v2004-20240802-en
General
-
Target
https://login.onefile.co.uk/invite?token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJLZXljaGFpbklkIjoiOTA3MjBhY2ItMzE1ZS00NmIzLTllZGMtMjkyYzBjMjhjMzJlIiwiRmlyc3ROYW1lIjoiRWxsaWUiLCJMYXN0TmFtZSI6IlNoYWxsY3Jvc3MiLCJFbWFpbCI6ImVsbGllLnNoYWxsY3Jvc3NAYXZvbi1wcm90ZWN0aW9uLmNvbSIsImV4cCI6MTcyNzM2MTM4MSwiaXNzIjoiTG9naW4iLCJhdWQiOiJMb2dpbiJ9.ZoV9MnXCKhBVyJ5XsqCme7NvRWOQsaqitJsJHTp3TaY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5092 msedge.exe 5092 msedge.exe 2968 identity_helper.exe 2968 identity_helper.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3108 5092 msedge.exe 82 PID 5092 wrote to memory of 3108 5092 msedge.exe 82 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 772 5092 msedge.exe 83 PID 5092 wrote to memory of 5004 5092 msedge.exe 84 PID 5092 wrote to memory of 5004 5092 msedge.exe 84 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85 PID 5092 wrote to memory of 4876 5092 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://login.onefile.co.uk/invite?token=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJLZXljaGFpbklkIjoiOTA3MjBhY2ItMzE1ZS00NmIzLTllZGMtMjkyYzBjMjhjMzJlIiwiRmlyc3ROYW1lIjoiRWxsaWUiLCJMYXN0TmFtZSI6IlNoYWxsY3Jvc3MiLCJFbWFpbCI6ImVsbGllLnNoYWxsY3Jvc3NAYXZvbi1wcm90ZWN0aW9uLmNvbSIsImV4cCI6MTcyNzM2MTM4MSwiaXNzIjoiTG9naW4iLCJhdWQiOiJMb2dpbiJ9.ZoV9MnXCKhBVyJ5XsqCme7NvRWOQsaqitJsJHTp3TaY1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabc4646f8,0x7ffabc464708,0x7ffabc4647182⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7998364664577627210,17728755577109646960,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD50984a7a64ff27520b0a251aa0fed0f71
SHA1ee9785318e56db34346c1cac8b8bd50bc1a410e3
SHA2561c40ed4f814dedefabd300a543ab72279a8ca5fcbe75514ef5a051cb01735abf
SHA5126826c17935d3c683cebdcdcb00644fd021cb8568209053d0aae5c5c66437042c55ccacc2f487de6f104d42a43029cb25c60c8b6ebf56ad4375a23e8e9d255199
-
Filesize
187B
MD534f77da14cdef80a4f0004149b6bfc6e
SHA1151d67b76f67f093b022372d837fd21b2b084dd5
SHA256c57131aeedcdfefa320dd5d2284492f50c24e6f8bf7cac2007ede9144f4a5f9c
SHA512162a2a0a020f8cc1b0b6f5be0ad85b2eff80cec824b192e877890634464e65ec39155eb2f5c44d88ed4ef23ea3752582673a2e80f31cff34616e8de4ace1d8fe
-
Filesize
5KB
MD5d4b9aedd6df087ae1b218d588dd7a623
SHA1bb4ae2094523460c741a79249f26ac814b18ba62
SHA2569cb5720ec2915835f6d629acc7abcd487f9f45ddf359e3eb30ebc85f1c26639f
SHA51209c566fc20f3998ca5e861a35cc91cef72ef3e1028e08db792328f23220ec0b442dd2bc5ab34aa97c3165a231b36079ebd004293f937370a9797b5cf0773a4dc
-
Filesize
6KB
MD518bc60a8acc90cbf53010f7db1e893c8
SHA13f5ead0613495bfc148c7b0a13b3f9c9fb247358
SHA256eec93f0604615864c3417a5e027c107482011fd75032951ebad133ae6acdf91f
SHA5125a8d9def58c4c895c26e2a667701e8cdb43771cfe3eb2ae003473702792034c52352675955e9af2e32451e506a035a9df76b71cae1d7dd009c59260208811e24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD512fa4b75f5c53e15c80408713e4161cc
SHA18862548a0d794c005e0768cc7acf3c6c34a45aef
SHA256316698607a2e6d4f99f9fc647f9681e0a5675787f0b7660145c41e31f4f57a25
SHA512e2b807be71581c97f1e38a7d8a443d112c4fafb012ef074223fbfa65b0cd6704f6ae9efeb185ea01b6428ca939ca930e54aaf964d6751ddefdfe7708057b76fc