Analysis
-
max time kernel
20s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://linkvertise.com/1253311/fluxus-key-system?o=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://linkvertise.com/1253311/fluxus-key-system?o=sharing
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 73 api.ipify.org 70 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-940901362-3608833189-1915618603-1000\{1C2F45C1-27A5-49A6-9B4C-9D954F7920E2} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 4380 msedge.exe 4380 msedge.exe 3308 msedge.exe 3308 msedge.exe 1680 msedge.exe 1680 msedge.exe 2436 identity_helper.exe 2436 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3308 wrote to memory of 3516 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3516 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 2008 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 4380 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 4380 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe PID 3308 wrote to memory of 3376 3308 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://linkvertise.com/1253311/fluxus-key-system?o=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8640646f8,0x7ff864064708,0x7ff8640647182⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2852 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11544079993753296784,14837570215358418689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
5KB
MD5c2698f1e4b2c8fb644a70cbc3b5618c2
SHA148f46afd56219ea8d390f5ef5ad7c2f2f53f1f16
SHA256cafdb9272df504100d3a92318b5126de0b2c2fbb25f7d605f7da8f520b519d8c
SHA512ba7aab6b3d26f65fdcd1f30904ca4e6e255f14862cbfadfc0e1683575a9143474de50a5ee10c40bf72e78a1d7fdf47e1beb497c5faf0217c29a4e87ba6c9137c
-
Filesize
7KB
MD5401c13f485b1bdc424f6aa622d3804d5
SHA1f27f7656a80ae6b0a0aa592e716eaaaf9d25386e
SHA256264cf3950e9c8ad59dbce7057cfca057ed66bf9901093de21f537fa0f743f3a1
SHA512915a434fbf6591b3b02227ac41a1990758e5857becf3f2259aafa99798f8c53626ab3b862e83cdb6db038f19bd45a875d3d421341e5410bf72036440552d10b3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5d8a48ad7de52175cfd8b9cb5e0b02efc
SHA1cf031fda7075b5d899300126c555361a8eaccec3
SHA256d0753dad9932890016f8b016d3d5ea3bab59d7c04b931d9f1c076386611ec0cf
SHA512d99ff4179aa59e37a06296fdbc29d2a7ad9541c4e9e702573aba6f5e6974b5bb074fa2c76145e7ff96d2bc4678969436d358fe1781185aa80778e641e607b254
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e