Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 09:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipfs.io/ipfs/bafybeigzmjhzrlgpi4dd4qnlfjhofd7lv2fhgminxestnv3t2cpb7yeaem/html
Resource
win10v2004-20241007-en
General
-
Target
https://ipfs.io/ipfs/bafybeigzmjhzrlgpi4dd4qnlfjhofd7lv2fhgminxestnv3t2cpb7yeaem/html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2772 msedge.exe 2772 msedge.exe 1300 msedge.exe 1300 msedge.exe 2460 identity_helper.exe 2460 identity_helper.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1300 wrote to memory of 2144 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 2144 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3508 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 2772 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 2772 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe PID 1300 wrote to memory of 3820 1300 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://ipfs.io/ipfs/bafybeigzmjhzrlgpi4dd4qnlfjhofd7lv2fhgminxestnv3t2cpb7yeaem/html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84c2846f8,0x7ff84c284708,0x7ff84c2847182⤵PID:2144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:2892
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:4468
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2344 /prefetch:12⤵PID:1604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:3180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,458411668971930898,8205128750593961472,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1604
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5fd73474da3a942261661ff176f983654
SHA142e833ec1d54856734794d7d983e3c55db51991e
SHA2566b606325c60b61a94796904a97d13042946928597bc3c926a85fe03a64de0d55
SHA512e385ecfdb45ea84b93adc71204e39bccde87689e6cb8da5c10a692eb5686add1676681eb1da998f8d82999c5757b24d955c0773393ef9a4da7222467e8168e8f
-
Filesize
878B
MD5862f826212e9a6dc98c2847baa7e8de4
SHA1949af2f53f46440bd817fef7515b62e56f4f52fe
SHA256b3c738472fc6dd8adc2b361207126b2bf550215d264e7485efbec2a9de3ad65e
SHA512d37392057c611ffb1b7b6e3b953f61ccbd32e43126ec62fc684b412e1c1a944c9d9b16fd2abfa422116fc4d12c86e3f4775309eb6ed2687e4e10beed58d78f94
-
Filesize
5KB
MD5e276d0a84a34872ad890faa7cc47dc0d
SHA1c46e605adf3252997aad9c07a560ea8925f7b306
SHA25621591fa7487e3d879a024f504c7e2c66ffe0be3cd37eb0cf6343d9adb0b2846d
SHA512223baad000bb7167cab378ad4ce50102b837767f92a721f3dbe950dfe8424bb05d5f04a3fdfe8365de0dab9b39073e3b5648df6c51a2fb7fc7c10c8817638c30
-
Filesize
6KB
MD5fce471c615e887369441183c88a4d4b5
SHA1bf9e58c8f7dc4550895201ad4ce6e61e60061a05
SHA25661f7a17880085664d6ee23e144de75241765536ded0a8e21ace148a27a5b4a6d
SHA5129d2cb7b2d0bc3dcb8982435c009e73ee0b6b2b3695475d64313091366efcb49e7baa807e4893d30fcc0ad1f0986487c81c35be8fd46b0aeb16db5803ffbd0aec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD595c8108c8e389b065cf09eb2dc06e695
SHA19ee2fc1e149d31a332f7db0aaed7b0d49014a913
SHA25691ef0f2529fd10a365b5ea9a08876db298cccfae287793f4defe7b88404b0d4b
SHA51298905504342d55f65911a205dbc8c416dcd4f4ead4382c57ed510f61405f05e662b9f77da98b8c3a04a16af1a6bf51a472da48df20c2cdc65c21bcca9f44b680
-
Filesize
11KB
MD5f66c9f008e24397e702b62411aa5d68b
SHA1dfdcf389bb159cd0549c361e9603a88400eb92c3
SHA256103b32e93e1b4d2612230a7d9cb06f642198ff6bb3d001bb35d2f9374d5af2c8
SHA51203e59d47e1423a95f222311bd46e5d067db6ee4a7a446c05064a47eeb72b6961242fe811ff42a825804e71bc1ae962b998d17d4326df8477f274d11b2509c700
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e