Analysis
-
max time kernel
51s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 22:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steam.powereditemsworkshop.com/filedetails/sharedfile/id=4204295347
Resource
win10v2004-20241007-en
General
-
Target
https://steam.powereditemsworkshop.com/filedetails/sharedfile/id=4204295347
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 4508 msedge.exe 4508 msedge.exe 2596 identity_helper.exe 2596 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 1736 4508 msedge.exe 84 PID 4508 wrote to memory of 1736 4508 msedge.exe 84 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 3316 4508 msedge.exe 85 PID 4508 wrote to memory of 2552 4508 msedge.exe 86 PID 4508 wrote to memory of 2552 4508 msedge.exe 86 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87 PID 4508 wrote to memory of 1564 4508 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://steam.powereditemsworkshop.com/filedetails/sharedfile/id=42042953471⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde1be46f8,0x7ffde1be4708,0x7ffde1be47182⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11524096327872288677,14137296332406036186,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5eba1d2413d4e5b73646701f5db94419f
SHA16e76d11685d6df6162f71e83377b19329a8bed53
SHA256d00647df15c1bf6c6304b7ba970e195229c8c739dc5973c670f11202113c49a6
SHA512cd128ca36878cd350053a683ae7aebf0379f1a49bf33d287c0786bf656816de06569416cc81a7b9b52fabf3f48a9f629ac3b3eb2edb21b25b0cf853063ad7089
-
Filesize
5KB
MD5b0711720b5386685a670e40e74cbe726
SHA1170b94e24f99f5bd654e7af1135009f009bab59c
SHA25686077cd1c6eb4110ca8c8bb01f63d01201cbb0bcbf8d86f6aae5d160e26b455a
SHA512f6124b6269ab6d93e9b8d3fa06e4b7b386276b5d30501530725faa3a966c339aac61af38748e7edb605a76d3770be9451d0419304d4a5af634310a7c7e4dfc3f
-
Filesize
6KB
MD5d838aa5efd4713f87218f7ba26bef4b0
SHA1db6be26b0e43e0460df369951bdb5db7c98686fb
SHA256b6806df6b7acb2dee194f74b07d2d5114557431448d08db1e9f089d5ea297e3d
SHA512a2ac13e8e3e861e31a47e346ae9a118aabdc24f65430700ab8065067280a73e4d4fb6533ce4bc6adb77af401156e75f0987cb42709af73eb552e7d88b142619f
-
Filesize
6KB
MD591b290e7663e31a4c7c28a8c4dc854e1
SHA1433383398ea3d1346f6dfc50e4eba2abac256e8f
SHA25670c722d8601f26d298a25e5f22dc4be79d00d33e439282a346600256fb9f0452
SHA512ca2d187044acb9cd408b309bcd6ea6cc630992970703cc788cd289be827f9cc269a670e7557390046bf18e4cb5a2f65854b23556ac22629a1cab1c8c80d63acb
-
Filesize
540B
MD5ad25a2019adf5f4e7626c4dc504f40bb
SHA1374be16b7b633514f5222066f7a2950d0fe0d97a
SHA256b7c086c51d55e1c9e8a0a082338f5f84b022a0f5a7604da934c51e41cc39b6ef
SHA5127ade514c4e9ebe4e44e0cdedbce72fcc2ce900988f6abd80e6f07e08f0d60ad3fd576d0615ac5d1174edd6d419be1bdc7f3049cfc7b9a42069db1ca597009bff
-
Filesize
540B
MD5cd550df2220abb5cf73052f0031777a6
SHA12be6c807355989455ae1bb0fc8fac56497d5c591
SHA256bce3439f42ef73387b7c988de6a0005a457adfad9ee554b907ae30bfea599209
SHA5123f57053593dcd10d70141c563b7d463345b39aa27445cf3406741426319dfdabb36c433b9f389f80629eb0e6afea6229257a996cd4238a214c97e6d8e5fd5f89
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59e6c5611a0a831dafcb9b950c608c1ad
SHA12be7678edf9b9f9aa537a8a129fbb15bbea78b8d
SHA25605fc6c8507b5bf89a9f10e0e234504285c5a453104bd35dc1a12fb914d2ed885
SHA512160eb65766d3032fceef6db8f639d27ae56276e1bd9b20eba9dda5e02aee7ea18c7e9f54c401b92cd4a3578a2d0bee344b6168b7cc7e8ac543bd942764d924d3