Resubmissions
23/02/2025, 00:49
250223-a6ke5asne1 323/02/2025, 00:46
250223-a46kkssndw 823/02/2025, 00:45
250223-a35lwssncv 823/02/2025, 00:43
250223-a3bntatlbm 822/02/2025, 22:44
250222-2n3yaszqex 1022/02/2025, 22:42
250222-2mvwaszqcx 822/02/2025, 22:39
250222-2k9axa1mgm 1022/02/2025, 22:36
250222-2jmqhs1mem 822/02/2025, 22:24
250222-2bh3cszncz 8Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2025, 00:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10v2004-20250217-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 3080 msedge.exe 3080 msedge.exe 4936 identity_helper.exe 4936 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3080 wrote to memory of 5656 3080 msedge.exe 84 PID 3080 wrote to memory of 5656 3080 msedge.exe 84 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 3116 3080 msedge.exe 85 PID 3080 wrote to memory of 4356 3080 msedge.exe 86 PID 3080 wrote to memory of 4356 3080 msedge.exe 86 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87 PID 3080 wrote to memory of 2216 3080 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe670846f8,0x7ffe67084708,0x7ffe670847182⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6776484097288277621,1274023940157649038,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50d6b4373e059c5b1fc25b68e6d990827
SHA1b924e33d05263bffdff75d218043eed370108161
SHA256fafcaeb410690fcf64fd35de54150c2f9f45b96de55812309c762e0a336b4aa2
SHA5129bffd6911c9071dd70bc4366655f2370e754274f11c2e92a9ac2f760f316174a0af4e01ddb6f071816fdcad4bb00ff49915fb18fde7ee2dabb953a29e87d29e4
-
Filesize
152B
MD5a4852fc46a00b2fbd09817fcd179715d
SHA1b5233a493ea793f7e810e578fe415a96e8298a3c
SHA2566cbb88dea372a5b15d661e78a983b0c46f7ae4d72416978814a17aa65a73079f
SHA51238972cf90f5ca9286761280fcf8aa375f316eb59733466375f8ba055ce84b6c54e2297bad9a4212374c860898517e5a0c69343190fc4753aafc904557c1ea6dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5c0524ad6c04972d90312ea205e55cec7
SHA1bea628cd0774a7ee58ba9237bb27705018deb4eb
SHA25649e113fde94a397c77ef733747b13f6841c88fcb52748924389a9003fe7d80d8
SHA512a46d073ccb380b6fb12bb3e38a79a7a9687f67fbded2f29faf3c14dca36f0ebf675eba3b8b37c96b7505a62b5f0dcc56635d50e23f867647afceb4bb56d8799e
-
Filesize
496B
MD5260c4d94fc8587956633f6a32a2a0564
SHA1cb229e53625c88c4d3389ae13a1d427338e6ec10
SHA256a759449e7c6b75616961681f06a58647f9715ce05aa04128ae2d4edfe62fadf0
SHA5123c1116e0b5fbbd8fa081866af52f62774d18b38c1a08c6d0defb60e10cb0bbfce5d9c41b6347dc8c01361de3d96d0f31c629cf7f90372b8dd697a564b5d992e3
-
Filesize
6KB
MD54ded35a28c9bfddd2e4fb16ee999a0b7
SHA1ae6cea5091170dfbaf19fc75ff7591b529bbe93a
SHA256e5081dd2725094f1574b49137f0fa200dfcc454558a3657f4dd653f35335c31a
SHA512d59fdf6904909037cab88b748d8213734fb22b91dbaf2edaf297948ea89e13a7060b5ed9593043e8f56e82643eeea7915b490b27b665956bf326d37620b1d90b
-
Filesize
6KB
MD5f0d95e2d4df39cac9985df8e30696831
SHA15e19982be5826318ad00e6447380f2ffab629292
SHA256e6931030d18c3b0e1e60aa397dd9dafeecdff16f8e44352e55a735b4cfc190ea
SHA51284c07c0b304c3d97daf372986d2057ea94488420b2ada2f43d470b94bfbe53c6b37033449788762d241d93d248f13e5e495e5618239b9280d033f7781982cea2
-
Filesize
874B
MD59fdf86090165c51b83ff42f736dddd42
SHA1bdc45a57f88b988290220c2d9ace6e896741fc8e
SHA2569b842ac8c8d4d46ec13a290005384b0a1674051950dcd99789171ea905e78ceb
SHA512eeb0e64f8abce3376f5b5155bb5d021c7c3f1f4090be7955d3b5a09a114311e0cb6bf0614e057a9c4080975a31c36c0351da82bb652d3085ab8a1fe3f150cabe
-
Filesize
874B
MD52bbac42c163ae8d1e5598604ef56f3b1
SHA10bdf4b019a7538c8bb97b0fd5bfd285c3db1bd6f
SHA256da95f46c072f1e6e5991cc9969f356c88008cfdd290494bf7c87d743e1ef5249
SHA512ffaf3532c6efbbfcf4b3e1d890d9baa01fb151f12143cee711fc33101ea298e4b549f8272d2202ff236fb7b374ddcbcfb6829ee88da05055ec429fe7d5d810b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e18fa893-cb17-425b-9138-37bdbc769199.tmp
Filesize6KB
MD5be2d852a14914c30551c736a4b394d55
SHA1839e792136774d3bc894376e303fdc5cc4ba7753
SHA25651b6a898fdb91574c4442f48f6add0ea5b79227fdb0570e2175b489070e2805a
SHA512a31c6cd35f29d329a168945379459f080c1f2cc99344ce133698b6e038efef1c1e992d7751353e405876977481ccd815edcbe5cdfcdcfceafa834bcc8b4c1323
-
Filesize
11KB
MD50e265e5e67ef053e8550f3e5fb109a19
SHA1226de27e0185a0920b5492ae96f96e34f25473b9
SHA256f6304bf6e2e11145be9f76cb0a194543484b9e6dfc11817ac73fdd035cd80d76
SHA51224ca3e7f2f2eb3485dd682c9d51a2ce4e3c5419de91929331af303582099a9086502ae7a4ddd01db1eb5846475b21bc5004285735c8a0f156d2dff14877b1cfd