Analysis
-
max time kernel
1680s -
max time network
1684s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 21:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win11-20240802-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid Process 3988 msedge.exe 3988 msedge.exe 1980 msedge.exe 1980 msedge.exe 3956 identity_helper.exe 3956 identity_helper.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 1980 wrote to memory of 8 1980 msedge.exe 82 PID 1980 wrote to memory of 8 1980 msedge.exe 82 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 4024 1980 msedge.exe 83 PID 1980 wrote to memory of 3988 1980 msedge.exe 84 PID 1980 wrote to memory of 3988 1980 msedge.exe 84 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85 PID 1980 wrote to memory of 1520 1980 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff974ed46f8,0x7ff974ed4708,0x7ff974ed47182⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17243053237178082489,13131570951300569785,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5c1036cae392f0c96c81ce9cc9719389a
SHA140d33ea998129d733c7b4dbd3392e09f44b6d5c3
SHA2569e54bc06bde16baf542d8889674f43d7933501a602fbc0e321bf3ec3e46e96d9
SHA5129f702867b0601615d266f045fde712f2eee74eaf9252ac4dd12ee13955f7d965413def26b812236655cafe97e0b6ddd05e94b7b5814f4242033e4dd0fa6c9b77
-
Filesize
496B
MD5406d40f57c41b87d19b999ebfe5296fc
SHA17d6ce47afbb25a87565cebdaf0a1a2f4af4bfc10
SHA2560d179bd1f38ad65839441984c85dac651e393eb75c561885911cb8cce8be6974
SHA512a763d98c4e196a8f81244761848a52ab25cf2b4dcc91ff8a977828a7f3639f05248463828221b575942a4c99dc5b720703339e4cb59e11a301fefa6236e660fa
-
Filesize
5KB
MD53b089d371e60a93fee53f7be0eb7a8c3
SHA1df4a35c0a5b3f26f0057a152c7ba42276707889e
SHA2562e2c4d77fc6441e28a4e9015928ab3abbf4fe1582ba8d75f39a7a11acb6fc66a
SHA512709c8ddde7c86d453b0ef92ce210167ac07ce3d1b432f06ecfc61966d7deded356f78d0c90098fd8e3f316754176ca9f0b4b3e18aa53f265f1da248a583bb12f
-
Filesize
6KB
MD5d03c0127ea71143f08c869b7a8faf9d9
SHA1ad6e3b8b2fafb05c27e98fc8609efb0c3a3d9385
SHA2563584ee0c8df038e39e409b13dd15e2cd9d9d46bba50fc823c1d1b2a060c39fe6
SHA51233fe351922e5dc914cca1ef37bd4a8dab4f5a65f83043183ad40663915748300cb9e75097715ecca11ee3189034f8c9b71801c4b448dc2161c5b14c023706f82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5da96c57bca2fae65b600606f3ada0105
SHA1317b26c46bd0aad551842e86ad16e74ab5ad24a9
SHA25664036694e72eba007f59cd6203aef7ccd32c7600b3df510c8fe643f96bd2f912
SHA512b728e289b1d74abd86a55f3773fbc4b898cc4a51b730fed61e6ff771eb5500e2cfcbb6ac4b314beda3a39f1ef415b6daacd46ecaa0470c4e4a10167239a8a1b3