Resubmissions
10-10-2024 22:50
241010-2sm3mswdnm 310-10-2024 22:49
241010-2rmeqawdkk 310-10-2024 21:34
241010-1eqe6sshrl 10Analysis
-
max time kernel
41s -
max time network
34s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-10-2024 22:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/miroslavpejic85/p2p/issues/62
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://github.com/miroslavpejic85/p2p/issues/62
Resource
win11-20241007-en
General
-
Target
https://github.com/miroslavpejic85/p2p/issues/62
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 2660 msedge.exe 2660 msedge.exe 2380 msedge.exe 2380 msedge.exe 1396 identity_helper.exe 1396 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 484 2660 msedge.exe 80 PID 2660 wrote to memory of 484 2660 msedge.exe 80 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4608 2660 msedge.exe 81 PID 2660 wrote to memory of 4832 2660 msedge.exe 82 PID 2660 wrote to memory of 4832 2660 msedge.exe 82 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83 PID 2660 wrote to memory of 3008 2660 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/miroslavpejic85/p2p/issues/621⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda42b3cb8,0x7ffda42b3cc8,0x7ffda42b3cd82⤵PID:484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,862196312994400644,13874909233491885690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5889adbdb266f15db57a49133e698e303
SHA17fd6a41b8bab9a667201b29b54abe5edb81368c1
SHA256d6fd2752293d2591efa04025092edfe7757bf9f883fed62457769abec62636e7
SHA5121a1f00f62a69edd75ab2e1789913d5d4949d118bae9d2ba6a2fd2727d2eddaebe5332d48cbd21f23202a6ecaecde6f91b58b81029f87a75e4aebbb1909c93155
-
Filesize
5KB
MD58f4d5455e810381af28d7666279e46e1
SHA1b60d8bb71c3bf415e3124cd763c0fd205ad6987f
SHA25655b6e906b266e0789db555ddeff6c68c3a530113c13ce7029d8eb4db79097ca6
SHA512e6fbd5e913fe9a4102f0551c4553c6607a67e3cfd2eb7f97f487bf40d92170d404aeaf0f8c1dbf489ee63e5b29ad9718516600ee359dd410cdd6537e61af9fe4
-
Filesize
6KB
MD5f68ad41b08e42153f418e20a932ce30c
SHA182f74c8649d052639eaf65f5c86d499e5672ec22
SHA2563d44b61c9716158f31acdf62633839d3da7a749c0716907c1fe6c4f0e4386ba2
SHA512796fcb58d48ed3612f1f17b3853fb811bc776358c7de9ca19a66389d0df340903e541ed59fd5e4f87a5d2962cbdd61b8445bff89ed9dc0ec9b2a860458aec4e3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a29cd6b99e490ec291040e89f0e3e062
SHA17da1cdbc52496f35f3fd79d9e304d0aca447dfae
SHA25667cfc6d79743762bf64340906d480b1bdd8d5bd029577ffcfe60969ec50c455e
SHA51256ee738bee08df5e17e3b45074de6ec4b57140790ad276d7468085c3f1d9d4e379ec2ca8d69ea45b7423f14cd688014676e29b35dcb8921715c5bf216ee7f5dc
-
Filesize
10KB
MD5c367d218f23cdfb07a4d0c4e3292ae1b
SHA1cbcfcbbe2d83d26b95d6077a61591d9ff485ee48
SHA2568cca48a46b4d2d02253fd28364b748198ece32339ba6e976369017505208ee5d
SHA51222b607699bf00f85dd9ff4675dc8ab643688966962cea4f17aebd1271009de880337490c0213085cb8af8b79c4a95851c2447fb165e44a9eebc62b910856f575