Analysis
-
max time kernel
157s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 08:05
Static task
static1
Behavioral task
behavioral1
Sample
??????.url
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
??????.url
Resource
win10v2004-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
????????SP1.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
??????.url
-
Size
219B
-
MD5
122e953f3a92541c27cc62db2d9bb0f7
-
SHA1
5c85d98b4bce0daac9631297ddb00b005161d131
-
SHA256
5bf9390d32df4da5ddb91425fc5002768a85305964a8e0cb8eda391b4b6511dd
-
SHA512
77240964186d2e9c9c73ed6bf13edccaeb40c0d8cbf477080c9a40a76d044964330e97421e4b45818bfbb2688e6bfaf6720a52f2efdd3b944f3624b1b5767583
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\0adbfaed-4e45-411a-a964-90eaa08c9aeb.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220620100735.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2256 msedge.exe 2256 msedge.exe 4888 msedge.exe 4888 msedge.exe 3824 identity_helper.exe 3824 identity_helper.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4888 2896 rundll32.exe 77 PID 2896 wrote to memory of 4888 2896 rundll32.exe 77 PID 4888 wrote to memory of 4484 4888 msedge.exe 79 PID 4888 wrote to memory of 4484 4888 msedge.exe 79 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 1944 4888 msedge.exe 83 PID 4888 wrote to memory of 2256 4888 msedge.exe 84 PID 4888 wrote to memory of 2256 4888 msedge.exe 84 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85 PID 4888 wrote to memory of 1296 4888 msedge.exe 85
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\______.url1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.uzzf.com/2⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffb113f46f8,0x7ffb113f4708,0x7ffb113f47183⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:83⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:13⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4924 /prefetch:83⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:13⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:13⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4692 /prefetch:83⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:83⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:636 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7ae665460,0x7ff7ae665470,0x7ff7ae6654804⤵PID:3240
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5872 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2132,17535075602067231175,3827568842520447963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5500 /prefetch:83⤵PID:1796
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344