Resubmissions
09-11-2024 10:14
241109-l945gsvqck 809-11-2024 10:12
241109-l8m5ksvqak 809-11-2024 01:45
241109-b6sl6stmet 809-11-2024 01:43
241109-b5qfestmcy 308-11-2024 23:24
241108-3dw8fascpn 10Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-11-2024 10:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://zillya.com/zillya-total-security
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
https://zillya.com/zillya-total-security
Resource
win11-20241007-en
General
-
Target
https://zillya.com/zillya-total-security
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 5084 msedge.exe 5084 msedge.exe 2176 msedge.exe 2176 msedge.exe 4296 identity_helper.exe 4296 identity_helper.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4392 5084 msedge.exe 79 PID 5084 wrote to memory of 4392 5084 msedge.exe 79 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 4416 5084 msedge.exe 80 PID 5084 wrote to memory of 3912 5084 msedge.exe 81 PID 5084 wrote to memory of 3912 5084 msedge.exe 81 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82 PID 5084 wrote to memory of 4428 5084 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://zillya.com/zillya-total-security1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdc20b3cb8,0x7ffdc20b3cc8,0x7ffdc20b3cd82⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6136 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,7077892492005726334,5529686172681828507,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5a3ad57657baf29cec31449450f23dcc9
SHA1c6708dd882fec85ef2eca64d8fab6ee4cc2284df
SHA25615ce242695f8cb266ebd5d6e56eff68632bc3697572e5b798ecb9a142ef748e0
SHA5128f8574784bfd9173d54f43fdfcb9b809c3ab8600b3eb867c45ff02b7f45e36edfd7910b871926b2d9521c03b236609d06e44616d7614b4756f216c6ac2006553
-
Filesize
2KB
MD5502b2ba0bec770257888bdcd75e4bb16
SHA101407d95c4a7ad152824cc25e749b9e9a0ad4fa6
SHA256e6a5f002c2ff6b147db27dc15bb7a9f364ece817956b7a5d04e4f938a5569bf2
SHA512e3807089129cdd84c8c1d1616fb4d6910bd0976f9a7408298bdbf8bb4f0c1d27d1cea901add5953779f839f7e8315343c3149927dd4204ce72be5a08dbdaa63e
-
Filesize
2KB
MD5952a9b0b7949d6c7367a21942e3669c0
SHA1b6fb941613cf58914d379c48a885813f45037279
SHA256d5002aeed2675a57021d3e0457a8aeef394326bb64fd7657cdf9bc27264372ec
SHA5126bf1a9eee9474512a0e17f39766ae5511eb34dd4666d64031060216a453f02ef1019717f9c96b38c6d1ddcf74d462b5d0c528fbae4d22c3dc394779af6735727
-
Filesize
5KB
MD5a895b151550226475e567ac1555e4116
SHA155946121c4e96d6217cca5d03bbd6dc61d749f6d
SHA256eb30803e8f314d76cf06b96de2fde1faaf9e800c3a425904bd2a71b0e6cd40b1
SHA512bdbc2a8dc6a2e685396fd1311c9c1777ef5cda14fdfa1abad601220597814219fe5a77c5258aca31240aa26a76183f70c0d3851b6e75432cb6fc5ca7b6a672ea
-
Filesize
6KB
MD5aae86779fef6fb23204dc52ba1514aa1
SHA12db22a639a0b0fc9ff209edb9f88cc1f12e7e8a1
SHA2561a9e0bfca100a684e8863ead9c3b640c0ea3836b275500c0570cdbb8eab8b082
SHA512703b52f448df52970d9694a48d64bab97ec9bd6d771219cb36df287bee3ee0d02e1ebe5c6a3b743df353a06ce8982bc1c4e9e65e643243e4d5d748bb924a5106
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5588079696366fb1df81770cda6b3cb10
SHA19e97f773e8c74435473725db13ad0b5957e4d327
SHA25676d80acb7aec4dd962f0eb80007803522c3d46b99444c63fae77d221b9cdc541
SHA5123d3450e011a2cd2d927ba0417edcddda08cd1f9f5a0021b3f557aaac9200789319325956d33b0892bb4291a9876accc8737e22cf82cf583c18c11d4d5ff016e2
-
Filesize
10KB
MD5f88da8a2f3e9af048191a739b5d60be3
SHA1122958bbcc128ce4eeeda16aeb2e94bc709803e5
SHA2561a9d45246c5c133c11751762e8d1c073388c6fea2d490fd12f484015ee74d5c5
SHA512d771f0c3ab996681c1cd0d375b59f0cf75dcdfec7375de86bfc7e239248f461032ccf9b0d36ec8459946632920029b82b75a5c447da7bd3ce52c83b531417823