Resubmissions
18/10/2024, 08:45
241018-knxmvazgjp 818/10/2024, 08:37
241018-kjayaaxcpf 818/10/2024, 08:36
241018-khvw3axcmd 818/10/2024, 07:54
241018-jrwpaavhje 818/10/2024, 07:44
241018-jktw4svema 8Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/10/2024, 08:45
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://816b462f.5880c482d0a3061180a519e9.workers.dev/[email protected]
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
https://816b462f.5880c482d0a3061180a519e9.workers.dev/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
https://816b462f.5880c482d0a3061180a519e9.workers.dev/[email protected]
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
https://816b462f.5880c482d0a3061180a519e9.workers.dev/[email protected]
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
https://816b462f.5880c482d0a3061180a519e9.workers.dev/[email protected]
Resource
win11-20241007-en
General
-
Target
https://816b462f.5880c482d0a3061180a519e9.workers.dev/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 2624 msedge.exe 2624 msedge.exe 2272 msedge.exe 2272 msedge.exe 4344 identity_helper.exe 4344 identity_helper.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2916 2624 msedge.exe 77 PID 2624 wrote to memory of 2916 2624 msedge.exe 77 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 396 2624 msedge.exe 78 PID 2624 wrote to memory of 3868 2624 msedge.exe 79 PID 2624 wrote to memory of 3868 2624 msedge.exe 79 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80 PID 2624 wrote to memory of 4668 2624 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://816b462f.5880c482d0a3061180a519e9.workers.dev/[email protected]1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9f2cb3cb8,0x7ff9f2cb3cc8,0x7ff9f2cb3cd82⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1824,543897428282119314,12735236720492669398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD57750e4d32b5667240bb67aee6738a12b
SHA1f9409a36eb63e9726293387b66f72b2ea7b786e2
SHA256a2784f236031b8921250049ade04f9df20e2d4744942f0b36b525fe57603119c
SHA512956c8115f8571b01c0a2f64c329541da36bdab96ee4ce6e0efc3deb99e315e38dae7902a0af0beeae60c158231f32df9f8816c0a42484c2d8bdf7bbe2ec36170
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5173e145c291adcbe915f52ba7d56f5dd
SHA10631409ac49c648c7f2b5b581d66dc8e9d433370
SHA256ca3579ca8312021d1008bc327fb8308d593f9bb6b9202f46435fa382654831b5
SHA5120f5f75c22f9882b676e2338503bdd9a269eb3fe11bf4b4b5a88bed6d6632a238b60f2c3daf8795bc8ced262ef52a290416986004b11a76fbc9eaec0e78e9b39e
-
Filesize
296B
MD50d0932996e14604f2bf56eaafc718dc4
SHA108f106474fa0c9490ee925c0e10ab8b69bcb08d8
SHA256b13a229e246f41546cc14ecdeffd4300fd53488f2f73e0954d601a61a0aa1994
SHA512801fd3e1d8e11deaacd5d8530a9412f9c80ee7b663ffbc9b0f9ec9c471e5981aa373f6046a3144cf094e53021d487e543a93538b8afb27c1d6663d603c433059
-
Filesize
5KB
MD5cc6a03fa8fd7eed9b87b82d48ad91b6e
SHA1d58156b538898cad7e28a4bc19bee06d0dfe3ea6
SHA256fe32caa5e7ff065d3329383b9b1b25d633a6cfcfdb48e3db5775d598e5830872
SHA512e07bf57543bd2475cfb6cb5b01598d466989efef425ff88e3904257f5700c6869e850d24c83e1d23155bb7ac1c74b34557e439aca3b7314e115f5220ca76c8f9
-
Filesize
6KB
MD56176778e709f877b893a48ece3f6f4d6
SHA1cb90fd87e922d2b8e86f038b2fb56927bd51b13c
SHA2567c691f83964188ec11a3cea7e278801015bc59fb31c122027219fad1a5c43854
SHA5128ea0c456230e71773b943495cd2fadca3bfbe8cc24ecae2eb6ec22224ee66dfa7993b33f7c4e678ca1aeb60b27f34f26b6819b8657479d07d899744432d7abfa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d3552a48782add318b351c29e5aa8530
SHA1bb59bc757c986dd43d32c636d5d2d6f63d11be53
SHA256c205ae656f20448df2e5281531dcc01052cabb63a6196da12d6dcb60022aec82
SHA5123bdc01de6cd4fb3eda4ffc2078a4a59b8d382d9dcb2d783e75f02c762899688494f60d7b10ba1d8135803f71d5763b29300a8e996b7ae3a11fb9f926c08174e9