Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 14:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/folder/lz0lQSgS#XF1os2SMSvfaeypCzZEfTw
Resource
win10v2004-20240802-en
General
-
Target
https://mega.nz/folder/lz0lQSgS#XF1os2SMSvfaeypCzZEfTw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 1652 msedge.exe 1652 msedge.exe 3708 identity_helper.exe 3708 identity_helper.exe 5760 msedge.exe 5760 msedge.exe 5760 msedge.exe 5760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 4516 1652 msedge.exe 82 PID 1652 wrote to memory of 4516 1652 msedge.exe 82 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 384 1652 msedge.exe 83 PID 1652 wrote to memory of 4804 1652 msedge.exe 84 PID 1652 wrote to memory of 4804 1652 msedge.exe 84 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85 PID 1652 wrote to memory of 3632 1652 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/folder/lz0lQSgS#XF1os2SMSvfaeypCzZEfTw1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4792 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5855415552712000239,7042977190452608633,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x410 0x4b81⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\20e2f5e9-33f8-4012-8870-af43c3bd2a04.tmp
Filesize188B
MD5008114e1a1a614b35e8a7515da0f3783
SHA13c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA2567301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5055e18355836691db0a437c3db746c17
SHA1b3340bbb5eaca0d28144ccd6b689e29860832724
SHA25657516d7bd9934f49c37f9dedc18319c37b3c574aef56a06694b8485b17429271
SHA512c72731bdf42bf4d45af8b79da916f90aac6fd118c46a9be7b45d3e4c1ababedde7def1cb9de5f3b0462666001e99a5600f498acf3451bf26fe271fe6871bab98
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
5KB
MD59aa7327a322aabb46c36ecc00fe34464
SHA1f7dce8c1cba6c2937aa2c71eaca0adf3b4e98127
SHA2561a26c230c023c28ff6317b1296ac2a3a8465efead494fea539413730b7dda71e
SHA51272e815dfbea5965d314e2d0fac8f685822be9ac3041fe12ef1dce5524fb1e4a684a9d66b90f5d0e0b593e40da264450aa230923fa1e19c6c09ec21ce598cd2e4
-
Filesize
6KB
MD5995c1e5d7afacff994db228dbb29b638
SHA1c97701fcb4019c314473ca6bcdc89160a8253f4f
SHA256b9750b22231d79ccfd126c65a40b387f26bd7b0a34514f898c52841bca6217af
SHA51284f1afe75beb10c000178a5a8f21633ea350a59cc4aa55c1697a46796e6f45b75be0cfc79f9acb4b12ed0d608d35c14aa3bfcc515e43360c0d18ba9e2775d0d0
-
Filesize
6KB
MD51788b378d0d1d433f35e076886156847
SHA1077c8c84fce57e7f00d571863e2a5b447d00531b
SHA256e08abfb570aba489158064dee20d04b969790eb46c5b2c879bc50a9bff90f4dd
SHA5126fb6485b592a3c4008ad816503b9016770e7a121f034b998836e9d7c6fb04dda46c568b8b62a9d21100cd4a13cf53c79066b17d352afe4aa765d5906912db514
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5aa4f851354eca0d5990c82203b4eb835
SHA1fe4a2a6847b4a28af3961c3013a07824fcdacdd3
SHA256fdc636f64330742187f1310105b757c51d5180e467943a6d85350a778bdc950d
SHA5128d48f9b2c921cfc0626c40162557a183cf3552da6a8c220a4411f39fdd88815a67d52c7642472a838a30f47d4f32918f659e41844a021d2eec11b9405ddd644c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581558.TMP
Filesize48B
MD53a99289d9240923f8fdeb7d45d513507
SHA13d102867cd9877c90bcf9c00068f0ebffb64c41e
SHA2564cd2b1908b3bf4a0a15c4c2f935cbe2c2e3355471b25a1a442b82c58b30413cb
SHA512a8119ce3604de2967855a4e4aa711f988d7c1e9b005aa7161edb905c92306358a6e7c32f54e9747ca7c1644fe9deedb54b4748fbafb335a2ec58727774d22e4b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e8aff21ed330832a92c078db87d3e99f
SHA10f05800c1234c008af83706beffc0edb58e82d0e
SHA2567ea9da53290403bf28bd1396e5cc5696db1e0cab1900def8ad596333d8a43fc0
SHA5124c47f82bcce2c7942c4f6fe054f85efa62c6132db17669e11a84739188d87297ab3e838e916ac1480b2eac53cbfcbe115bbdb2e27910feaf39a73cb6eff50a79