Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 22:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://abdulchoudhuri.co.uk/rurl/index.html
Resource
win10v2004-20230831-en
General
-
Target
https://abdulchoudhuri.co.uk/rurl/index.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 4296 msedge.exe 4296 msedge.exe 3896 identity_helper.exe 3896 identity_helper.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3668 4296 msedge.exe 46 PID 4296 wrote to memory of 3668 4296 msedge.exe 46 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 3464 4296 msedge.exe 83 PID 4296 wrote to memory of 5008 4296 msedge.exe 84 PID 4296 wrote to memory of 5008 4296 msedge.exe 84 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85 PID 4296 wrote to memory of 2020 4296 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://abdulchoudhuri.co.uk/rurl/index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb082546f8,0x7ffb08254708,0x7ffb082547182⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10473168974737782177,6467346281962946455,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5184c5c7572a6b42b329aae4e94e9b801
SHA1adc61339fa23296b5271ac2b7e0de1d7390c4e12
SHA256ce44f115c3b1677a95d69195266225da59f4dd8cd9d57fd713df35b91cc564b1
SHA512692f524f7b95da9ef6e247772dc5e949fa3aa34a61675fa5c59698583c1708f0aecf454a06f8deb8bdd7690fce5bc9c76bd2a544ea6354fda15a924480eee820
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d78ebd2bcacaf1398e068e8f780d795e
SHA1e41d2fe7024eface9f4bb5b1b47129045cf78d8d
SHA256e67354ced8a457c819d951a1250c671cb31627e15df79c8e6c43f5c9c05c8e8e
SHA51272f20d78c630ed0516d501da0b2385b1be4cfb9642b1480d3302f25839cf6ea38fb55aa7a2e0107dd236ec35801bd0f64882f606c7623fbdd79012f22f381518
-
Filesize
5KB
MD5c9151626c425e9571a75e3ffef1b918f
SHA1ce202048b14eb4356ff7704171811bc40088161c
SHA2565115ab1d5377834f1de1924b607fc7348dd4de73294bdc6bfc4dd156cb117576
SHA5120d3c53a8c64f60f57aa9e4024d56ccaddbfab2ae2b1d17bee2d2c51bbd1842b7bd90fd9d0638d8f79e383d7144e7d097f89aec0fdc36367798219bc66ecbdf2b
-
Filesize
24KB
MD52236cc12bac28f32727898f8e798ea71
SHA160b010388e64c9c6b7278329c25ef18895c2e4ce
SHA256fb27de22688cf0240d03864dcf317d31701e0f0da97f5bbe6e545030f5830d77
SHA512df522872bcf008bd11e85c5155ead36c0bd2e33a0d44bf3c2ac7f52e6e0df3dcc3067165869509a1ac7167919509672fe7c961619a9f833e8a92a59de456ced6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5625cd07dc87a5ef3df682ce08165af5e
SHA18bd58b3bfcb7b2e72e7296684fcc8466b24bcf2a
SHA256dd5678746ebb332602ebd859a9e5506738906fd0f2678fe85a1a92915a3f23ba
SHA512f2373a8d0ccba6a788e43ecbe30a96c3878ca79d5b63c491bfaec8657583762b5d7b591ea3f238d4d06ecd4fcb58f4e9a869a122d43259d507ed4d3537be1007