Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 06:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://steamcommutiny.com/tradeoffer/new/?partner=148972342&token=hL5xBGgK
Resource
win10v2004-20241007-en
General
-
Target
http://steamcommutiny.com/tradeoffer/new/?partner=148972342&token=hL5xBGgK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 744 msedge.exe 744 msedge.exe 4500 identity_helper.exe 4500 identity_helper.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 3484 744 msedge.exe 83 PID 744 wrote to memory of 3484 744 msedge.exe 83 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 1716 744 msedge.exe 84 PID 744 wrote to memory of 4188 744 msedge.exe 85 PID 744 wrote to memory of 4188 744 msedge.exe 85 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86 PID 744 wrote to memory of 5092 744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://steamcommutiny.com/tradeoffer/new/?partner=148972342&token=hL5xBGgK1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec77846f8,0x7ffec7784708,0x7ffec77847182⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9885334185839918739,16589851730880163890,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5ee372c6eb715df8f83907442ed894edc
SHA1829176b2238349af5ff1abb657011975024d67cb
SHA25641f2b78f256860c9018d0a25f90257884c89b0747745e70594c1335c57510666
SHA5124a265ef7e2fbad5968afd0db6d68dcd51bbb6b15f0cd9ecca92a8afd947157e568cc3830014ef82cdfae7a8b134b2c3ed2612a96885428acae2dd62df82b927f
-
Filesize
689B
MD53a59de2c4c101096bd7cc2b527b0c626
SHA124362c21778230252f57f2dd8f23c5fcd93bed0a
SHA256868c03a5654df5fcd9faad49a4080e6f68481bc5c1e8436e295090ae8767117e
SHA512f25b50f8b63e3fa46a14d6f44deda710cecd5fbc9305370a7f7e143c5caef0ce0aa420e5e2c95e61a879f73ab5a043d9503d3caa706b925b1e737587037cd69a
-
Filesize
5KB
MD5a5f662ece3d2dc9149afa82b6b28151c
SHA1141102bad7b944b71eaf3d4b7e28b8fcfdeb9cfc
SHA25649d77eb4544ec7e6c74dc4100f73f7040be7ac6fbd8d14b312d1f8d08405573b
SHA512143aa8e1b1f2db6af2ceb821bb22198a3ecfb388e8045c55fce4eaaf15e121db94fe3b2972fa0ead85711421870e60c52ce3c34e2cad498d3bb8b963637e6702
-
Filesize
6KB
MD5832493441aa33dd6ab99982b82f5e625
SHA1e6d20c2ed12f54f6ad842da151d439399b2cf038
SHA256aac4fe0f3133ebe9a9078745d9edf6ba53ea9163b361e2970a56d145be59857b
SHA512310fa0c14746fdaa2ee1a2a7431447b1ee3bd0476452d1a03a31967e280e5b95e0251e2f9de6fabbe1d95667156fd2665d71ce90c57c84d3904183a2ed59bed4
-
Filesize
6KB
MD5a3dc3b59fecd535e2ea273f472001d3c
SHA15124c52301fd3314746e228dc2b932bb586d6e0b
SHA256ba07b085a7503e744583e036c68de0ce28abf5acb7a9bd94af04694c8cb5304a
SHA512743f664b62bd4d60b1a1b52aa9cc9c492239896f7cbbf5c0567abf1b383fb31bea01163a2136316def6ca1458bf49d91fa7e3c427ef085e526b615d2c7b09ab3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD52e3dc394ab3bdfc15419ec6e9a25128c
SHA1d90c107acf62dbe77fbcbca791b76e4e3c110e77
SHA25695abf53487a20a5302c010b1d23d9a2851f2f2683d44e17b89132172f59f510e
SHA51224b860c012be9d892391b25b9f6f6e823392faa2454a82693aab79a19421394972f7ff82906e4348ed0cb0405d2907c69a4d7e26fab664c25f71597b9f338a5f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84