Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-11-2024 15:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1308949442098893035/1309170828382048256/PrivateLoader.exe?ex=67409bd8&is=673f4a58&hm=d9250fc1ccebb9d0458e1b2d34e5e39f3fa743d576feb41f3e989543465f18af&
Resource
win11-20241007-en
General
-
Target
https://cdn.discordapp.com/attachments/1308949442098893035/1309170828382048256/PrivateLoader.exe?ex=67409bd8&is=673f4a58&hm=d9250fc1ccebb9d0458e1b2d34e5e39f3fa743d576feb41f3e989543465f18af&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4248 PrivateLoader.exe -
resource yara_rule behavioral1/files/0x001c00000002ab87-32.dat vmprotect -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\PrivateLoader.exe:Zone.Identifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 211548.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\PrivateLoader.exe:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 5728 msedge.exe 5728 msedge.exe 5536 identity_helper.exe 5536 identity_helper.exe 920 msedge.exe 920 msedge.exe 2568 msedge.exe 2568 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5728 wrote to memory of 2972 5728 msedge.exe 77 PID 5728 wrote to memory of 2972 5728 msedge.exe 77 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3420 5728 msedge.exe 78 PID 5728 wrote to memory of 3136 5728 msedge.exe 79 PID 5728 wrote to memory of 3136 5728 msedge.exe 79 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80 PID 5728 wrote to memory of 3100 5728 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1308949442098893035/1309170828382048256/PrivateLoader.exe?ex=67409bd8&is=673f4a58&hm=d9250fc1ccebb9d0458e1b2d34e5e39f3fa743d576feb41f3e989543465f18af&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0x48,0x10c,0x7ffac1093cb8,0x7ffac1093cc8,0x7ffac1093cd82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Users\Admin\Downloads\PrivateLoader.exe"C:\Users\Admin\Downloads\PrivateLoader.exe"2⤵
- Executes dropped EXE
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,8953291115922895263,9149031347569570395,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d68c7edc2a288ee58e6629398bb9f7c
SHA16c1909dea9321c55cae38b8f16bd9d67822e2e51
SHA256dfd733ed3cf4fb59f2041f82fdf676973783ffa75b9acca095609c7d4f73587b
SHA5120eda66a07ec4cdb46b0f27d6c8cc157415d803af610b7430adac19547e121f380b9c6a2840f90fe49eaea9b48fa16079d93833c2bcf4b85e3c401d90d464ad2f
-
Filesize
152B
MD5c03d23a8155753f5a936bd7195e475bc
SHA1cdf47f410a3ec000e84be83a3216b54331679d63
SHA2566f5f7996d9b0e131dc2fec84859b7a8597c11a67dd41bdb5a5ef21a46e1ae0ca
SHA5126ea9a631b454d7e795ec6161e08dbe388699012dbbc9c8cfdf73175a0ecd51204d45cf28a6f1706c8d5f1780666d95e46e4bc27752da9a9d289304f1d97c2f41
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD5686348d873fc3c8b6e5c04f78122e96b
SHA195015619026e6d12b232155e0ed7d3ffa8bf01d0
SHA2563af10bb488fa1c9c2ef0325c0dbc4adf6c2cd6d6f135d3cd73dbcd176bdf871c
SHA512f5cec03fe1692d59380dc331dec99a99fd6b88a044745e057e9b8d36ff820327a7eae769c333cd244e438a343513b05761b1ab7a3917b5419c2c5d0b6ee21871
-
Filesize
5KB
MD5ffdab887b2e50c4e70e3790b25e3026b
SHA1052d9cdbb132d1adbe9295a0c9bac19f9d75c1b5
SHA256a53a800c6800ad4321a8e461f764d0b9c476cd2795841eba6129ff8c18043ade
SHA512c876d496f5d1bb99a1ad394026500880e47bdbd81d9c9185dce64fb77ee82c00a8e7c3e1532bb986717702c2ffd80ce6eeac3ab8c75db01be92e7d5b214c240e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55e624ce6d9194d9e8dd7b5963f2c75ca
SHA13416eaa8e9341f6417b7738bb8f88bbe7cafb43c
SHA2569b435e39e03c8a9cce449aeb75a55713e6efe579203cce7f80a736a4493545e2
SHA512f340278ae3f3cbc6a53c835ffd59be2fb46a3125fd9767c83f3e510a49e8753c0abee18c701f2c823139a106db7cc57be1ee0defae8e95bbe3309c7cc02c9820
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
6.5MB
MD5a0d8f6fddc41161005589dac3ed3fbae
SHA13810340786e0ec2ea33bfd8451f4919f2c5f139a
SHA256494f75d0d8774751764ce794d54b4ab26050e29420067a7e191ff8878610df78
SHA512c81043b146ed2ea2ac44b8b84af4bd3d7616674ccb0e208726a7fed94d39329fe3ef1d510bd59784c7b057e3e77c0ee45efb175f95b5166c507f04f11a847093