Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Linkvertise.com
Resource
win10v2004-20240802-en
General
-
Target
http://Linkvertise.com
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 63 api.ipify.org 65 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 4840 msedge.exe 4840 msedge.exe 796 identity_helper.exe 796 identity_helper.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4380 4840 msedge.exe 82 PID 4840 wrote to memory of 4380 4840 msedge.exe 82 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 4576 4840 msedge.exe 83 PID 4840 wrote to memory of 1364 4840 msedge.exe 84 PID 4840 wrote to memory of 1364 4840 msedge.exe 84 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85 PID 4840 wrote to memory of 2392 4840 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://Linkvertise.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde23f46f8,0x7ffde23f4708,0x7ffde23f47182⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,12628548555127028539,5263563362861909763,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD50ed274c81d183607470c4377b12b62a9
SHA1e12eb019036a1b59f02fc9fcbe3e98b1b6c00a70
SHA25694c503b5196ca9ac2421f1bf3ad627f80fc65e2b217b99bec6a49c3c972b4046
SHA512da44a517df1081a5e6c7ddb22953780256f9e96e2fd995774fe40461a2e7aa217f0e7425cdc3d65298e57c7658042baf49301db0047b98189908234083724291
-
Filesize
2KB
MD5d640835aee0b98991ab3f9840ea72409
SHA1965b5e005cc94ba889caa0c59b6b1c902c31d1d9
SHA256c8c45f4140a66fd4e69e08b1d544aec953df5164c5b4ba6b7693011061fa50da
SHA512a6af1276aad814eaa81e6dbf0e0dd6f05bf03a3e1a9c8f889c4157445811052c2765b6e84c149fa34cecf42671e4854916133c15e2a1bb011ca000d10e9c1a21
-
Filesize
7KB
MD5e58c5e98f19c62f9f66dd9adecd7981f
SHA1e942b2d23e67c6a5dde608c7b43177bad4308975
SHA256c1e094722fdd452b6c11cc1e2c7827f64f1e7f24e9998089f3c40d842749efd5
SHA512b5ddca920e7ef1b659a17cb0007f985d275d95aee65d2d690148cd5e3cc9b4b10f2232930432ac8ba4526934c2d230db4f832cd9e683a5dc1fd17ee58f20fcf4
-
Filesize
5KB
MD59da0ee1b718a209dc47fedd2c995808b
SHA18735611ebfcda1d9b35d5be9515f77a359d5ebd1
SHA25629a74d6e125e40de2afbc927c858c6bc2c766504fe5b6c54c3c78b62d4f1dd34
SHA512b7c8d84e7dea408bcacd065870b371e38a4865db5d1bdc5da6891590ab07acb6376e86f4363c394adfe68586e7f774f3f6b678f295d0bada39f378a63ad7ac4f
-
Filesize
7KB
MD5addba461f037f3efc6e1e219f45cbd93
SHA1c0fd3350cfdade382730779189a5953f2a9426ec
SHA25678236c9026dc7d987644d158863934bfcc0d61fdfbf573bed7148353df2e8666
SHA512f9e74ef17dcabf6780492c5de7df4c3e3c50f62e31c416227756ce8bd86b135be622ffce854d1914a4ca8c26b095d9a82009966d7bf7754216065139566cbd09
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5d1e039a5bed9f1f05d6d651cffdbadec
SHA1f9243255ef2fe12af73bae209603804dd49e0439
SHA2563a2574275bc8b9fd62d136c726546f5256a358d83b9e9c5e8d9cf8d71dabeb88
SHA5120d6cb6810ac805817c237615ffc0a8c5b84c8a437d694c9c2b1a38ad7b3dff1e167c2be16a9a141e7f352c951b20099a602d59a9b097db76c4507d6a83fd5e79