Analysis
-
max time kernel
960s -
max time network
965s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 20:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shorturl.at/DTola
Resource
win10v2004-20241007-en
General
-
Target
https://shorturl.at/DTola
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 4288 msedge.exe 4288 msedge.exe 4136 identity_helper.exe 4136 identity_helper.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4288 wrote to memory of 1720 4288 msedge.exe 83 PID 4288 wrote to memory of 1720 4288 msedge.exe 83 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 484 4288 msedge.exe 84 PID 4288 wrote to memory of 1580 4288 msedge.exe 85 PID 4288 wrote to memory of 1580 4288 msedge.exe 85 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86 PID 4288 wrote to memory of 5016 4288 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://shorturl.at/DTola1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe11e546f8,0x7ffe11e54708,0x7ffe11e547182⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2236 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,9295605257228629854,15446407103516869971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\73dbf745-3068-40e0-989f-416006ae333a.tmp
Filesize6KB
MD5fb49a250d8c65de29c87f5eb80cff1c3
SHA172df088d1a7e1060fba7b1f674f3d574ea6c9a51
SHA25643af11c8c72872c699337032f0eac17807a62fdfe4625144749ca413c9e9412a
SHA512e6d7d8d24bf2291f2839f79f7ccccd0fd0a38ceb3e45be7cba9aaa5135bfd31664e92081378bd1537a92a23aa7abc822d0521fe7fb4d04b5a34e41f56e23bd22
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5bb73571a3ada988a0a63e5667d8198a7
SHA12ab8b573ff21a66ecc90b463fe7a60aa8eff76e5
SHA256312ca423051ff76232592a49cc326f8c94aa19ae2c1b890fd44bb569f82fdd01
SHA5123daf5e4f3a05124d007e640e256d00615050cf466838b74fa91fee4a3c4446633cd994e356577a6f0dbe8986697b45235db24a785f8469e7d6e3d730fcb9cfc8
-
Filesize
855B
MD579ea4d2fd1f7e6fde8bac18402cf07b4
SHA1d71791590d73d8697082610b68ddc154b7394f22
SHA256d6dc7948fced5de815ef3b820cb00b2a78b1d21b12db3511c2335930860da662
SHA512c445cad95a6d5a7c87d79b0c612241381b8f53db04bd17fd729ef62bcaa492faccceb1bc0e75782c9b65abc2fb5263dae793993dc09e7698c264ede6ae7f4e78
-
Filesize
855B
MD58e7f9e6d6afc4774cde23b66a2945ce2
SHA163c74779d3a4a87e1e0b8eb04ba286ec1a3dd2cd
SHA2565a13101382f12d7ec8ed7c8b3c407d20c461480fe0442f6ec5943a98f6ceb6bf
SHA512c5a063842e4bedf852ec18e9a4321c65ac161a50de972c989218769f927b62dbff2e7367221f55d14205519bd780020002d94fc505cede775b0e8280a07fed60
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5f56fb5c5c4c9f8d4bd41d3890f5694fc
SHA1b9f6e0be55ed756eba62993c6f7169eca5371517
SHA2560641ef7481c8900b6a42b87116b7a9fa2ec35b1fa93959a7ea254d7a126226e5
SHA5120703294ffb2764852287a05b05b57abf9b3b83f0af5df566606ea33bd83baa84f68a1cac8dd18a9f7bf2e7c0747a37da601e110a7feb518b22496e39b176cad6
-
Filesize
5KB
MD563f90ac424c6b05f0e134becbc21aa7b
SHA1b79685c3af3ebba48dd24c7cfb8675a355a627ca
SHA256f75464bd44a37d85b3c0f9cf6beca496a958b2d484400c48a78f7d9872129ae9
SHA512996462e8f917a32a39a1729af1a1b5db69e36ca76ccbde772a58619a73040cf9c6bff805038e91a6e384ab5d0250b0f55fd1d41ba00718ef1070723288ff6caf
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59599e5bd47fcb37f2d5e3ef50fba443f
SHA1b002b1cb83c7d3bccf0aebd429d30258d43935f5
SHA25634cb4380b98b29ce033245270256418ce977b1178525713e76af60c66f4d198b
SHA5129ebf8316bc3a85eecc360757194fc665e83b55c6520f1f5d65ab8d921c9ad95fafa9a9b8dc2eb753dfd65de9cd8c786c3e16d5f49c520fc65e7369405ed94e13
-
Filesize
10KB
MD51531c94664b934f2a143df1883066ea2
SHA1eeccbcb39682bb68bf34c262f033d2f854ec2c05
SHA25690249cf0593247841cc59e891a6f3534fc7bd261ed037da075cacc6998daa84e
SHA51239c2e1f67d19356db35f5c99a97108a5b3ce91dacfc603c728d42617848dcf80f262892435a389ccda104e3f61edee4d72c0c80887b3599c5871e0afb664022a