Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/10/2024, 10:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/stringfestdata/xlgs-mdae-sep-2024/archive/refs/heads/main.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
https://github.com/stringfestdata/xlgs-mdae-sep-2024/archive/refs/heads/main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
https://github.com/stringfestdata/xlgs-mdae-sep-2024/archive/refs/heads/main.zip
Resource
win11-20240802-en
General
-
Target
https://github.com/stringfestdata/xlgs-mdae-sep-2024/archive/refs/heads/main.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\xlgs-mdae-sep-2024-main.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 2188 msedge.exe 2188 msedge.exe 3660 msedge.exe 3660 msedge.exe 4376 identity_helper.exe 4376 identity_helper.exe 3512 msedge.exe 3512 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2880 2188 msedge.exe 78 PID 2188 wrote to memory of 2880 2188 msedge.exe 78 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4384 2188 msedge.exe 79 PID 2188 wrote to memory of 4920 2188 msedge.exe 80 PID 2188 wrote to memory of 4920 2188 msedge.exe 80 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81 PID 2188 wrote to memory of 3800 2188 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/stringfestdata/xlgs-mdae-sep-2024/archive/refs/heads/main.zip1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf0bc3cb8,0x7ffcf0bc3cc8,0x7ffcf0bc3cd82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,15713812641829730186,13484474794620835916,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d30a5618854b9da7bcfc03aeb0a594c4
SHA17f37105d7e5b1ecb270726915956c2271116eab7
SHA2563494c446aa3cb038f1d920b26910b7fe1f4286db78cb3f203ad02cb93889c1a8
SHA512efd488fcd1729017a596ddd2950bff07d5a11140cba56ff8e0c62ef62827b35c22857bc4f5f5ea11ccc2e1394c0b3ee8651df62a25e66710f320e7a2cf4d1a77
-
Filesize
152B
MD503a56f81ee69dd9727832df26709a1c9
SHA1ab6754cc9ebd922ef3c37b7e84ff20e250cfde3b
SHA25665d97e83b315d9140f3922b278d08352809f955e2a714fedfaea6283a5300e53
SHA512e9915f11e74c1bcf7f80d1bcdc8175df820af30f223a17c0fe11b6808e5a400550dcbe59b64346b7741c7c77735abefaf2c988753e11d086000522a05a0f7781
-
Filesize
255B
MD5d11edf9e08a127c768843acea41d0bc5
SHA1ff1af9b39de4a3f547407fd9864ffdd2bb6c7354
SHA256217e4d9d1412e45abf7a653f72a5ab8b53bc8fc6f377f52a042668a41abc7478
SHA51292c3f0def567b0e2f2523ed25eb9d4abff06070b8be744fea4a6678f25f292439d7bc0c8015eaa6281b7f43149eebb3d3821cd6d6436598481113694b11ddea3
-
Filesize
5KB
MD5a907d1bbfe524948f7be57bba3a2eedd
SHA1afb17809e9f1509a0a3ea8165c9f5b7484cd121b
SHA256160703836c9bc95f0fa274e7da1c21944cc97d6df115923a44dbb4efe1817306
SHA5121d8dc47acd77c226fbd12d7f1ffd22b10ca05ca89e9d5fa495ef5cc28c8694b2584a67130a5cd9a77d4ceddc371d9ac0db8765a032bed4d91b624485199465ad
-
Filesize
5KB
MD500017a32c42024aa5b1d26ac622fd878
SHA1ebef072cbdd1c529a749f8f9d48bd439512048b7
SHA2565de108d87fd12e85279cc0c09141c86929ff291797ad4dd6322876b7eecf8655
SHA512339d577f6f88bd437bcef0a1e1e3290128e25140d741335d85fb1df3a56ce7a9824e4954f37a182abf09a74bd9a51429c743bf106eaf184728a5ed67591da42b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d7248cdafecba64a25b4eb42547a3522
SHA17274ec8dfd30cb2c1a417d3a64da434ce1022d9c
SHA25661c331b854282a62656dd46fb0d65ceda526280e16da9d7b67abf576507cc4e7
SHA51227226d4ea52073f6b58c23f6c3381214146bb67a459d0ba97fababfd8e8d358daee5d1abe5517b3cb78de03125768079fb7d57fb6f8fcdb9ea6e33bc035636f4
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98