Analysis
-
max time kernel
85s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 08:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 3276 msedge.exe 3276 msedge.exe 1980 identity_helper.exe 1980 identity_helper.exe 216 msedge.exe 216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3424 3276 msedge.exe 83 PID 3276 wrote to memory of 3424 3276 msedge.exe 83 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 3336 3276 msedge.exe 84 PID 3276 wrote to memory of 4544 3276 msedge.exe 85 PID 3276 wrote to memory of 4544 3276 msedge.exe 85 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86 PID 3276 wrote to memory of 3016 3276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d06b46f8,0x7ff9d06b4708,0x7ff9d06b47182⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3060 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,8328459189791359158,17729872136877723560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d940082588dc6679b3712b5b7bb1c3f0
SHA1b922bb5d091bde5a66c6cf0d5d1fb8c28eae07c6
SHA25684fea1951c672b48cc8eadb9f6d8219eccc36791dedf257716f06ab4e659c643
SHA5126995a3752a6ee13a80d509780c44148b0b39af6e606d5b497277db649d64eddb3e4aac2b1bcb3f29153e1aa97e11734d79800c5598d4b4924616402fa8fff628
-
Filesize
573B
MD5a6d346f58cbec0a6e4015327b25f1537
SHA1750056e65a8b1c20b1a6051f5adcdf35821a6ac1
SHA2561a715b1b5b62ef83ca8c62a18eddb3b5b6b738be2c654ab7a38cf22fdc8bea56
SHA51274e563217a28cd6427739731f51ba2e35ee060c8ae6959d458d06a0416e17ffc6a49f8d0bbcb8d17cef144a45c36eb9f3b92305389ab0cfc5043f530d9f28d89
-
Filesize
6KB
MD5bddd9a46d4816f793005b4443aa2169c
SHA18eab83e972f37466913d8b013fc61ef4316a6fcb
SHA256afbbf22b3a96ba130834362acc6e149822b68d8f46693ba96908ced8da33e18f
SHA512acf614f93ac49c775415c3ab4fe20859b8452cf9af93299902ae9510719da832476bc9743ac349722f40da07a0c280b00a6d502d38319133a00b9fb2fdc5b7d3
-
Filesize
5KB
MD5d651a5a0d0a732cde7e70eeacfc7fb71
SHA141eed231804c58f5c484a9cfebeef8bc1a1fbb5c
SHA25678dd7e3596174bf7c76e45939ce8ebacc02ca7b3e670446d2f5185caf1277fed
SHA512d22c41d2a8865faf789ae5abb33411c24dcb2cf96e9cfcc7f26b172a2fb97eab373fbaeff2aeb26705d54426f82ca6303f5e3fa4894a4c150624ba098623cac2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bf03174457274f63da386beeb84d1644
SHA1b2e3447129d69bc1bd977eacb333c96bec8f8ce0
SHA256c9fd879ac23b37d1a76edcce319c5c887e9d1fd7ee08a68d103f7033d2a27462
SHA512278c6da5f78a3bc2a259b3f9f8977f8809f4b07343b7ac4f8dd77fc2d0963b3ffcfb974ee492076db2f3d9245c3718231172502bfbb291f0421fd40579094624
-
Filesize
10KB
MD5f92829104ecfb6a694521b8fc8c99f92
SHA171cf44a0221b025c9a40c7946545b5232acd4a43
SHA2563dd529e065287334f8f50810ae4d499b7eb335240896ea77cf86667af0152b50
SHA5125004aacb6673b246b22618c767d91f9ff867a851a0a3df591f4948589f13bf715a3994719fc78baa12864f41aec5f1b8776aa9f14ae5d504d58e8175c000b7a8