Resubmissions
31-12-2024 05:12
241231-fv24pawlhm 731-12-2024 04:49
241231-ffsxgaylaw 1031-12-2024 04:46
241231-fd1jjaykby 731-12-2024 04:31
241231-e5vlxsxpd1 10Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 04:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://youtube.com/@boffy/
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://youtube.com/@boffy/
Resource
win10ltsc2021-20241211-en
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: httpswww.youtube.com@boffycbrd1
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 3896 msedge.exe 3896 msedge.exe 2888 identity_helper.exe 2888 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 4176 3896 msedge.exe 82 PID 3896 wrote to memory of 4176 3896 msedge.exe 82 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 3388 3896 msedge.exe 83 PID 3896 wrote to memory of 4520 3896 msedge.exe 84 PID 3896 wrote to memory of 4520 3896 msedge.exe 84 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85 PID 3896 wrote to memory of 4576 3896 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://youtube.com/@boffy/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4ce346f8,0x7ffe4ce34708,0x7ffe4ce347182⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,4097581165572103751,5708336061245885734,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 /prefetch:22⤵PID:4700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5fd24679f5ed18d3cccbb0894bb3b0018
SHA1cce0e8dbfd5de47a5d4f6ce7f1cf1b443284523f
SHA25680a87806b1abcfd615fe9a695c472445a68559a354d0d0a9a86f5fc97d0e5d2f
SHA51272cf6e6e54141d0c9438b3028a7dc26023fa4cff6eebeb67fdcba8d54fc7bc2ff4149267ec08168db5e8b53799629382f1eaeeb1fd8036334f8bb95be63beabe
-
Filesize
1KB
MD5d66768c03fc30e761cd2963bf0dfde43
SHA106d15a8389a117a472e187894bc8613d321b7a1d
SHA2560aa756f8bbc1ca8d5f78124d1a1ad54b5f7aacada2e8ba6c0a76c7af16f01e43
SHA512c952a775b8448f736fa379bc12cfa03690abd338730a48f44d6418eaec68b66e6708bb74acf00a6a12b2fd69fa02bf4b4a9a679babbc89760565fa7f43a7976c
-
Filesize
5KB
MD5dee3c3e0e8356f303cbfeeb07cc6494c
SHA1254a229ffda9b62b5b9653727cf3bdbc69767de7
SHA25609b29d814e951a6fc6d396d4a28366757f155434b995ab882d7f2dea27c6a95b
SHA512535bb2cafe1f9845f85d9aac4b0f1f120482bab3d5958ffafb7ad692162bd7a513cffe684665293fc9b83d4741bcef1f114f9b78fc5c86a4e599511bf6fff1c1
-
Filesize
6KB
MD534504619506362d46abb7ae90f6f1fe4
SHA1cf4f7eb7e250be080007e72c50e3dac34c03e784
SHA256f49eb1922e6d5b4dbaa695c180822e2109251caf4858591ce7274efdaf050ca5
SHA5125bdaf6872863986624f07de4f89db0f71d83508f34457133a976fc2becdf2ef355d06058400efea9fbcf55f4005648e55684f005245e72d1782158f53fe9c063
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59acc0fc060936c57f47a1e5e0bc55b9d
SHA10a88796f38e8c3193da7f9bca29252c778870fbf
SHA256400fc7c55798f5af1491a51f0855422f7d52067a515661dc5b59306b71bd4964
SHA51294dc94ada597231127812c905734f5534b631b2874e111e3c368c35426c0cd4aa659132a821d5d22b4542736dacf7a912b5c089f757eff61dc7aa89af5160e5f