Analysis
-
max time kernel
1681s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/12/2024, 16:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1235764775841959936/1313213438260150332/loader.rar?ex=674f50d2&is=674dff52&hm=9f764eff3a7f6b8efa71ebf20aa16e2641e02ee1ebbc9145858d3356e29c050f&
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1235764775841959936/1313213438260150332/loader.rar?ex=674f50d2&is=674dff52&hm=9f764eff3a7f6b8efa71ebf20aa16e2641e02ee1ebbc9145858d3356e29c050f&
Resource
win11-20241007-en
General
-
Target
https://cdn.discordapp.com/attachments/1235764775841959936/1313213438260150332/loader.rar?ex=674f50d2&is=674dff52&hm=9f764eff3a7f6b8efa71ebf20aa16e2641e02ee1ebbc9145858d3356e29c050f&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\loader.rar:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 4160 msedge.exe 4160 msedge.exe 1984 identity_helper.exe 1984 identity_helper.exe 4508 msedge.exe 4508 msedge.exe 2164 msedge.exe 2164 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 2708 4160 msedge.exe 79 PID 4160 wrote to memory of 2708 4160 msedge.exe 79 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 4680 4160 msedge.exe 80 PID 4160 wrote to memory of 3144 4160 msedge.exe 81 PID 4160 wrote to memory of 3144 4160 msedge.exe 81 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82 PID 4160 wrote to memory of 656 4160 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1235764775841959936/1313213438260150332/loader.rar?ex=674f50d2&is=674dff52&hm=9f764eff3a7f6b8efa71ebf20aa16e2641e02ee1ebbc9145858d3356e29c050f&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff963ff3cb8,0x7ff963ff3cc8,0x7ff963ff3cd82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,12573846691433171165,5259688532612985560,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e9a2c784e6d797d91d4b8612e14d51bd
SHA125e2b07c396ee82e4404af09424f747fc05f04c2
SHA25618ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6
SHA512fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1
-
Filesize
152B
MD51fc959921446fa3ab5813f75ca4d0235
SHA10aeef3ba7ba2aa1f725fca09432d384b06995e2a
SHA2561b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c
SHA512899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD5aa9588878a26c2cad2ab51424df1faea
SHA109d116c3f820777389c5d11b57dd6d7de164ff6e
SHA25699e883b9e2260c2610d26f71711d36265e1d9d708fb9b5c291efd94596276a29
SHA512bb05d12715714e372e83588256a19a8ecf26057b06e34b098dc93f001f91458144e1c8e804aad521e54d1c297805ed8ad5ee6cee99fc0df32c4de08aaa296f8f
-
Filesize
5KB
MD53020c56e63c4ee14ee0a516369b55cca
SHA12d7830867a36d715eae8020de62d4d7925ec2b28
SHA256c7621c56554fb0cdf2ee129663aa275ea95567f534176d08016478b7d3eb3cbe
SHA51217f0f94d7cd08224d4b051f90887c4b9321afd768cbb0d424554654c6fad0f96ba66be6cf3c5a6ed1ebd8e4f2143430e337c54fe02e807b776c7358bc2c509dd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD584dc89b2a79dc7abaeccbd676836422c
SHA1cec383562bdad6a41c83ce8ed6d55920cc281cab
SHA2566c673e6d1fd09799151ac9ceaaa1657768123ed94733715f8300569c16812a74
SHA51285d94c9d0e0a2af541e877adb0dc7417d4529e0512d941b6931d06eba22381cee2916cbe724d4cb47615c01c3d05b3daa516779f2a63fb45f4f7e8f8a0eea605
-
Filesize
1.0MB
MD5f6d1135c395da113314def20efea6c85
SHA1a641c10c194f8cc34f26fe9a12d656619cb8a8a1
SHA256b58842deaa853e59011739f6ab82a6245cd3dec185393a7adf4a98bf0fe4f3c7
SHA51239523969edf07ea1661126e9806eaef502460770f1799af98341d788166d34bb51f9e78c8fd63e29ad285d19c9c274e384a65ce9b567223dbb84da6f6ade3698
-
Filesize
218B
MD5dcfd830a51a3b210a9c3de2f413658cd
SHA169dd961e70585fb614f9793fc21ceb904eae55f0
SHA256d8cb1b072984ee9f54ccd5e9dcf64253acf65a2e949896ac441802e752f163b1
SHA512ad9109fd0f68d278de8a784a50a8471f9780115999efff4e74c3b2ec22319b97b906bc61040531a404c303d6fa8bcf8a9c6bd6b808277f9cfdc109ffa9e7b081