Analysis
-
max time kernel
1151s -
max time network
1154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 03:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamcommunnnity.com/glft/activation=Tvc5Fh3mw1
Resource
win10v2004-20241007-en
General
-
Target
http://steamcommunnnity.com/glft/activation=Tvc5Fh3mw1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1744 msedge.exe 1744 msedge.exe 3480 msedge.exe 3480 msedge.exe 940 identity_helper.exe 940 identity_helper.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3480 wrote to memory of 3620 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3620 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1812 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1744 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1744 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1148 3480 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://steamcommunnnity.com/glft/activation=Tvc5Fh3mw11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff705046f8,0x7fff70504708,0x7fff705047182⤵PID:3620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:400
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1228
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4024 /prefetch:82⤵PID:3296
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2500
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:5032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9214892410162625542,4631686970460535140,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5e5eae14f002c7f11110c34d93f56fa39
SHA1028a3fe7283ab4374896fd7538139087fbb6caeb
SHA2562e9f4c93c721f5f277ae700e64d484b00562ccdcd271592e1d6776e45104dd58
SHA5128c748379a564d521343cc09a68bda5df762e87db432ada8de93d74d97d31abc688b03b42be4f2754fadfbb7ef27d97091419bcc82df687ec1896a0acad2ae839
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD58e8de71a727f844d8869dde66c10e8e7
SHA1863bc8ecaa0c098b0b981d12ba7df13b43c62fba
SHA2565633127c44752996fceede3f8e137647b18e708398a787a0cd9204329e0e046b
SHA5124d70cd70f98b0662d9aeef933b1473ea5c7e5c245a970b8bd9ea1e76cc5dda707ad9e7bb3f2f1cf3905f2eaf40fcdfb346fdf1c4c0aa22e23a118cd88edc69ed
-
Filesize
422B
MD5fbe58d2ba30ede980e61c267a303ed26
SHA1c413b8d51d4b96b8e254dff74fa68f5a611cf0a6
SHA256138bcaaf10f5eeca46d978b8cedf2df35cc024a4ed5a82fad38ecc25815e9043
SHA512cebb2d13bc11517c3c102bef5906b7052f0baf9f43cd740ce2ea245525095ef0e1a3975f3e9e3d4c21d6bd4fc9dc6046f11f8a8c9971e803720b0b461f8e2337
-
Filesize
5KB
MD560630498c43bd3d643233c23bfc8c2d4
SHA196ece6dfe588dd72c4054542fa46955e12a9cf2e
SHA256ef3889a4d6b2d6352afa15826ee825a27a1ab8c1bb45ba771366cad97d682a10
SHA5127f9ee9e198d7de4925fd89b031388e39511b2f0f639f09d103ddf16a6a2540479f93c4fa9838123b1791fe243328f2aa20a4b43085489cad58249f951683302f
-
Filesize
6KB
MD5a2e8b0e5ffabef53eb3e7e62b844fc38
SHA1b448f1049d9f459e7abcc3db089765e341732578
SHA25645cdd40f13040b64009d08f33f28f73f195673eb01c59907040c08695380df00
SHA51202fd1bb0509d1d39c5b925e4e478be165748d188a3183c05a2311c05fcc57dc3ae18894303ad8cf692192fc2742044027d69c744445978a21c5a129b45759ac6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f87c6889c4470fdd6643f30a123defb8
SHA1c25b8ce3d1bcfe0a16159775a49a66b2cfd13c36
SHA256850e33b91d5d21a9edececd34bab31e331def59278ad53c6cda08df9725d1230
SHA512ab79ff10e8fe650a4d89e765faaef2275cba9e5cb5442e2ea47f6a05ad2a041a1594a373948d90f3e472ea07bebd2d3cf2e7225a526013900df8e4884ee2ea03
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e