Resubmissions
09/03/2025, 10:30
250309-mjy18azwh1 3Analysis
-
max time kernel
206s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
Eaglercraft-1.12-main/index.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Eaglercraft-1.12-main/index.html
Resource
win10v2004-20250217-en
General
-
Target
Eaglercraft-1.12-main/index.html
-
Size
1KB
-
MD5
6240dd875f24fe43e5080887b9bfe78c
-
SHA1
1581e257e3d8bd82a558f2f84b8bf5834c8efcd0
-
SHA256
06a54a3ee26a118b00d5c970d4bb61434aae4db2a5a51dd73e8c3daeb09ac141
-
SHA512
bba52b6bcca022c1167c3597cbd3e79b2f070295aab207a033fbf45539dc5c8fbfc88968d08a47813f2d28299d55e4fb5fa28c5a18c56adf422c8a6d87064cc6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 3320 msedge.exe 3320 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 1344 identity_helper.exe 1344 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 4560 3320 msedge.exe 84 PID 3320 wrote to memory of 4560 3320 msedge.exe 84 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 1212 3320 msedge.exe 85 PID 3320 wrote to memory of 2996 3320 msedge.exe 86 PID 3320 wrote to memory of 2996 3320 msedge.exe 86 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87 PID 3320 wrote to memory of 3472 3320 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Eaglercraft-1.12-main\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfdba46f8,0x7ffbfdba4708,0x7ffbfdba47182⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,2959511615552149591,6576398509472328113,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5395082c6d7ec10a326236e60b79602f2
SHA1203db9756fc9f65a0181ac49bca7f0e7e4edfb5b
SHA256b9ea226a0a67039df83a9652b42bb7b0cc2e6fa827d55d043bc36dd9d8e4cd25
SHA5127095c260b87a0e31ddfc5ddf5730848433dcede2672ca71091efb8c6b1b0fc3333d0540c3ce41087702c99bca22a4548f12692234188e6f457c2f75ab12316bd
-
Filesize
152B
MD5e27df0383d108b2d6cd975d1b42b1afe
SHA1c216daa71094da3ffa15c787c41b0bc7b32ed40b
SHA256812f547f1e22a4bd045b73ff548025fabd59c6cba0da6991fdd8cfcb32653855
SHA512471935e26a55d26449e48d4c38933ab8c369a92d8f24fd6077131247e8d116d95aa110dd424fa6095176a6c763a6271e978766e74d8022e9cdcc11e6355408ab
-
Filesize
5KB
MD562add9165aa2436f9d3089ac8265789b
SHA15b2fdc187bf45d25f2438238061a7db1590188d3
SHA256ca10a8fa96837ffa955f0b587eade3299e39845cd88addc342b438c510350bcb
SHA51223d8f6522cb31433e84cf3100e31cf156812ea3a92ede1fe35986cff8105b8a9bcb6cee6b39bae8f78b3c03ecacd75c524bc5a910e54024b23c28410be1d2198
-
Filesize
6KB
MD5f5deac3c729fca3fb3188bb586c6b722
SHA1272f2d6863b8545c3a3ea4133b57523842d169ed
SHA25688b57e0ccf95f069077de94abcd68c6a6524de6296777fee894e46e098190769
SHA5122c695119a783dd874f7d1cfcb3af7932b38877b615c03852e102cdeb6e9650bcdec42db9d66f95c817a4a8fad6ef83fb00b3d4fca45b089fdc18e1e37bddb448
-
Filesize
6KB
MD5afce218bf054553f17c54aa1aa739cb7
SHA1da907e4ef6cfb61dc096d8083c078bef9c5f9588
SHA256812db68e18472f6c04f953e343c46e1903b2bd422c0f5102acf8d2af2db67411
SHA5124886f26b96000e510fa580e4d0f053637f6ef95ed8dc884192c77e3ad932cec1d3f9de89462683774c5b441f9bbb0b9693fb8f9b408449dde64d72cc9fcfcfd8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5cbaccf30dd1a7a646957ee463b91949b
SHA19408af03385a312688225b915de64c05671e9f96
SHA256dce766b3650d42f7fac73b744978af138e5b5cd7c37260bff000f9910c1fdfc8
SHA512ee2d7b57af84e340ffe18159f685abd73aef76f2b01fa8b00b257aa1d64c92aa16d917e069ac083246872921d9055338dbbd48c5cd822e7b50700229cc7bb949