Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/03/2025, 20:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/PenguinLover21/Dream-Grabber
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
https://github.com/PenguinLover21/Dream-Grabber
Resource
win10ltsc2021-20250217-en
General
-
Target
https://github.com/PenguinLover21/Dream-Grabber
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 3848 msedge.exe 3848 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3848 wrote to memory of 1264 3848 msedge.exe 84 PID 3848 wrote to memory of 1264 3848 msedge.exe 84 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 3776 3848 msedge.exe 85 PID 3848 wrote to memory of 5080 3848 msedge.exe 86 PID 3848 wrote to memory of 5080 3848 msedge.exe 86 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87 PID 3848 wrote to memory of 4448 3848 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/PenguinLover21/Dream-Grabber1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffcd81846f8,0x7ffcd8184708,0x7ffcd81847182⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13955050428365427025,5442243755119164730,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57fb0955b2f0e94f2388484f98deb88f4
SHA1ab2363d95af3445a00981e78e6b6f0b860aade14
SHA256a7c4cb739d577bfc41583a2dbf6e94ae41741c4529fe2d0443cd1dabefef8d15
SHA512c9b6b6de78fb78c11b88860cd6c922d11717f5cf7477f602f197531aea114270c2b7111f66d96f60c3a9317fbf203fd26222e81d2d0eb70ad6515f5af1277edf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5fa26fb6b55e8f457e1c3092e5c4c2a8b
SHA19d98b7db388c53b828d72ca020590b1c770f10fc
SHA256d94a6af949b44b3b5aea77ff442c63256aec0437dde248dc58ede87bc4712b9c
SHA512d22e6b9f6e32fd13150ba58bb952b26b07302c4012bdf5f364ee957f78401f8ba57182f5842d1cb61dd36e7e0ce41705c638c00b5835f8163c28931dd6f6b41c
-
Filesize
595B
MD57f2cd6625be3f691d9599fafb317a506
SHA1f1fd630c672f816a5b022d614de595237df89c49
SHA256826d4fe8748b340761580a00341fdbb7ca2bd65574285c212076b411df0d6c72
SHA512d954f8c267a2c1df7b4477ec017bac758db61ea03e209e34a22e6cb3eefa69b7cc5a744c4163c7f447d3cafd46aa9f9d3e7b4c9a0c9bb7428ec1d388a7b89497
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD523c9074811f51862543c2300c262e92d
SHA13912eeb649e67842d72be14414769c2e01f8a8ac
SHA256852bd621b6b9f96a49fa991ed1a814e8bb8998f39cebe9b19a87ea6c9d2e27f6
SHA51224ee7ff349113a015fc46e7725e44247d32091871dd098f7fc0dee08e8e2d8ebaec87e8022201525b939382b326599b644766e9b49580e511a3ebde0b0d2787e
-
Filesize
5KB
MD502900df2507605e205e633e982d2405b
SHA1a8a99c662de327dd162d39feca71e1bb3dc3519c
SHA2564029f9582fb8d88ae3c054655999204ffdad0e232cbc24fc052fcc8858b82194
SHA512dbccd35d81e751a0f94e2528f856e297844edeef004a8a4113abf980df8397c9136752494b304306598f8b9178f496523555012d524f113bb69f9d09670dfc94
-
Filesize
24KB
MD52627e6345730a6a479da30c0883d24a5
SHA17442a41a25fcc5415e1609b647c6e414a32c7b99
SHA256640a5e5b62d5e5ce53f120e2238d95d61f09b45d0d4035fcedc0f452c431b26d
SHA5121cd1044e89ebd307c088b4ebe587d41dee3b6dfcb10fc4f70f95819fc9b1f98132b9715cf1bce76d5f15d97802e85776f2ae6bfb293c4d033e661e5d34354d28
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD500dc208b93d8470f93de2f7aabfda08f
SHA130ddcb7d3658991c1233127671869f9a8f04ff0d
SHA2569fc00022af123ac5e5f1cafc5e6d10ccffbac9c376b27a08c8341433c1440b71
SHA512b6b28d5d65bcf4a3177ab103b8552466cd5a990ba6c3965ff55978dceafd09e3ce994be8f86dab472a85ffa5e68d2319b4a20cb5545993ba1decb5764387519d