Resubmissions
01-12-2024 15:26
241201-svbb7ayrek 1001-12-2024 15:25
241201-stmntsvkhy 401-12-2024 15:20
241201-sqsexayqeq 1001-12-2024 15:19
241201-sp74zayqdr 3Analysis
-
max time kernel
1s -
max time network
4s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01-12-2024 15:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Resource
win10ltsc2021-20241023-en
General
-
Target
https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msedge.exemsedge.exepid Process 2884 msedge.exe 2884 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid Process 4532 msedge.exe 4532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 4532 wrote to memory of 344 4532 msedge.exe 81 PID 4532 wrote to memory of 344 4532 msedge.exe 81 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 688 4532 msedge.exe 82 PID 4532 wrote to memory of 2884 4532 msedge.exe 83 PID 4532 wrote to memory of 2884 4532 msedge.exe 83 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84 PID 4532 wrote to memory of 768 4532 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffccea746f8,0x7ffccea74708,0x7ffccea747182⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16104369909626121445,8230871334787541980,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,16104369909626121445,8230871334787541980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,16104369909626121445,8230871334787541980,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16104369909626121445,8230871334787541980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16104369909626121445,8230871334787541980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:2632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ef84d117d16b3d679146d02ac6e0136b
SHA13f6cc16ca6706b43779e84d24da752207030ccb4
SHA2565d1f5e30dc4c664d08505498eda2cf0cf5eb93a234f0d9b24170b77ccad57000
SHA5129f1a197dccbc2dcf64d28bebe07247df1a7a90e273474f80b4abd448c6427415bace98e829d40bccf2311de2723c3d1ad690a1cfdcf2e891b527344a9a2599d8
-
Filesize
152B
MD539191fa5187428284a12dd49cca7e9b9
SHA136942ceec06927950e7d19d65dcc6fe31f0834f5
SHA25660bae7be70eb567baf3aaa0f196b5c577e353a6cabef9c0a87711424a6089671
SHA512a0d4e5580990ab6efe5f80410ad378c40b53191a2f36a5217f236b8aac49a4d2abf87f751159e3f789eaa00ad7e33bcc2efebc658cd1a4bcccfd187a7205bdbc
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
5KB
MD5b722204d32c794ec11cae624e1cb551d
SHA1b3818fa1beacab838da48480b640d3c21a6f6ac7
SHA256518271282f711530283ae434d9cd6fd8e1f0856f8176f6879af09b7a64dd38d5
SHA512b69ef2bb397f0315cbe40bae11b0eeea34a15b799f8324db2a547bbadf7677f892d0204eebd9c7a053100d66fec3f18bf565ca0248f71077d6e91606d5f3fc1d
-
Filesize
24KB
MD560d82bd601d64fd00bb0373f5ecd65b8
SHA10e8bde426270dfa3ea285c2c5b7282ab37771d4c
SHA256bdec91a5061c6a400ef33c2dca5b1d0c16c1fe9e464f8ec99a72442b752e6a97
SHA5125ea1b33784438acd246c02c95716f72c78293bc8d8e8e6d71aeaab370ae9fc2063ba8ffa443bbfc26c96e45a95549b62894b846a459c986531b34a110d0be38d
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e