Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-12-2024 22:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://u.to/FYsaIQ
Resource
win11-20241007-en
General
-
Target
https://u.to/FYsaIQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 964 1424 msedge.exe 77 PID 1424 wrote to memory of 964 1424 msedge.exe 77 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 248 1424 msedge.exe 78 PID 1424 wrote to memory of 2360 1424 msedge.exe 79 PID 1424 wrote to memory of 2360 1424 msedge.exe 79 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80 PID 1424 wrote to memory of 3040 1424 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://u.to/FYsaIQ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9f2cb3cb8,0x7ff9f2cb3cc8,0x7ff9f2cb3cd82⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,10363665829621142232,3046175663409672385,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,10363665829621142232,3046175663409672385,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,10363665829621142232,3046175663409672385,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,10363665829621142232,3046175663409672385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,10363665829621142232,3046175663409672385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,10363665829621142232,3046175663409672385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,10363665829621142232,3046175663409672385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
Filesize
5KB
MD5bd0925f4d6992a787a28764366ad8e5c
SHA1d432f69e23d519851068b0d1b9c96e6f912a9ce6
SHA256dc062637885cc37a5f95b0435db955f9cbfdac9a8ce7e1bfec9c4cf6a2244a76
SHA512a043278d458d53cb20eda12057ab438a5edf3d90a0f27bf70f03634c8c2768ea0e8ca7a0a9243feb86e81b36124d7525c03fb61ef1735a815073d67b9a399ec6
-
Filesize
5KB
MD5277c7e0fe866fa26e091394965fbb1af
SHA182dba365387a37b26fa89f6f0b498355b7fd1de0
SHA256e040d64f3a60a0adc0c40d571883d7786a572862c0abf8de4a1fdc4fe0a72f2e
SHA5122045b47b3929e3da86d928d70d56f6670432e974c4d9c372c559b985c318a7a2748246bf724c0970b9efe21211449da2fccd8de64f4a83708ab5da8716f0dba8
-
Filesize
10KB
MD5ecca5005883f87e697b10793981249ac
SHA1673e4b13f9bb3ab5a4d35de7790f420a9fbd4206
SHA2566e24058dc109129ddcc97e1f7ed94261893885fa23aee637977445cb2811c79f
SHA5126b5aa076e2479c0a4d280a27b4e298a774d73fbbf576478f7e203c6a88b304a33473cb8a9f890b5600ffcd8867c508f2511d9736e6026511157134ad01fdab9d