Analysis
-
max time kernel
900s -
max time network
851s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 18:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vqr.vc/qyvX8ZbCN
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
https://vqr.vc/qyvX8ZbCN
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
https://vqr.vc/qyvX8ZbCN
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
https://vqr.vc/qyvX8ZbCN
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
https://vqr.vc/qyvX8ZbCN
Resource
win11-20241007-en
General
-
Target
https://vqr.vc/qyvX8ZbCN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 3672 msedge.exe 3672 msedge.exe 3952 identity_helper.exe 3952 identity_helper.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4272 3672 msedge.exe 83 PID 3672 wrote to memory of 4272 3672 msedge.exe 83 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2792 3672 msedge.exe 84 PID 3672 wrote to memory of 2916 3672 msedge.exe 85 PID 3672 wrote to memory of 2916 3672 msedge.exe 85 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86 PID 3672 wrote to memory of 4104 3672 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://vqr.vc/qyvX8ZbCN1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc53746f8,0x7ffbc5374708,0x7ffbc53747182⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,17247863783023175711,11052234413105707209,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD514085881a2029579e30bc6739d20c7bf
SHA1409b616407060167615263b089a0645751af1b00
SHA256f3777038f4f1f63c018acaa079d9381437c2a8689775911b1475c9fde87eb75c
SHA5120d6c131be5a435c5d118d9706d4132a04808e2941e88a21b321e67be721b58f27599ef18c09801522a295bfff0cb70ce6d6a9f0ee26270878a8974e42b440734
-
Filesize
5KB
MD5bff4b89e12110eb65b869d7d19d42cdc
SHA1db01ee74406b795621c9f60397f87b08e4d9b0c3
SHA256db894c32d4f497d7ac159ebbbb88637aceaf2fb1cc7bded9a05fe0300fcbc426
SHA512667b7888aae38ce9f9dd684f9e4f07e26bd4b3de17aec154f3905c97ffa6cbbfa44ca79ac800c909c219ac82318e2383ff2f6191f436ee5853963a26c23214a1
-
Filesize
6KB
MD586f4a6cfa3c5a742b9abdec3bd7e2ab5
SHA1bca350038399882d5e46772fc6a8b19b1c1f927b
SHA256e3de211f877c6654db406e167b7488710677dda476972949f196e38d86b5314f
SHA512f61971be9233c3d3b494da3c842d58dc5ef3ab16a673ed2bdc3821b0be735b0eadc402add63611af02119cef1e5673f2fe748698eeeb17c0eb1c67c7dce1b058
-
Filesize
539B
MD56e5e8be365cc471a1a9fc065017415d5
SHA1fc3499814fea63db4cd46dce2343bf08bf81bb19
SHA256d44ace242cab2f0f9d0ddcc12eb77b67f1ac13b95ec6da9c791011609a8ec212
SHA512b4a2ee3dc406aec992aa42cb2c1fc16b9ac979f60fd3ba67bb6cdec5c40841638b04e13024ef4e72a45f0e32256cb03fd111203ca603412aafd29f963b0effc3
-
Filesize
539B
MD5a687bf50176e64fb4affac82c7bd0cd2
SHA1ad9409af719d804467f3cd56f2cfab9844b9c6c0
SHA2563379cc2793670014a0022435e9712bff7c47172a69018e8f76b5b5a87e55f5f1
SHA51283e6b0dc4830f9f968823eaa2cf497920bd455c406ae3a1e88382886afaafc981a2a4c94a4a3e0a49177637346e445856ee7f909324450255865c5101fd8878b
-
Filesize
371B
MD5c67755141a21f9bf39b78d50e1649a53
SHA18fbdca93713bf43e414bbbfb50b7c1cfe51219d4
SHA256bb6a9a0c8440e3f24120cd6577a7e2596554b690ba63998bace3699a613df92a
SHA5123389845d921fc2d7bfab05e17a92331c89f0e88fdb25d23fa9c9452534814613bdb199b9051d444ca6404e8ef38f92cacbc1400550adf600d2e46536191b76c7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d67e1731-de25-4223-830a-8bb42d9b951a.tmp
Filesize450B
MD53646f6177f4381995f16af96e7f76a2b
SHA13a965e58285f64aa104585a3e9e15106dd8a3196
SHA25658c25161bc490c134ab0f16531336fe906ae91274bc569279b4cfa0afbb7cd42
SHA512850f4e48691ca8b4597c0fc9582bb5a0dc54673e2a82436911170f2cc923cfa325f07c08cabe40cb4ef8e8d07051f974a077837166cd02ea321fc0f3b688accf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53cec901e41ad13b235be070c9d7edd35
SHA1cdac77e8c4d8aa87045e02afd19e32e753d591a7
SHA25601440caab434a932eda7b03590de987a94d134abae6db8d320383df0b13533c2
SHA512979c03894775fdc750b14b578cfa873a347f25ea3b4b03428781a6caf583f7c56c297ff48aeb17d9bf0d8306299f893843a1813d9154ffcc0497da9d22e7eedf