Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2023, 08:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.uaudio.com/audio-interfaces.html
Resource
win10v2004-20231020-en
General
-
Target
https://www.uaudio.com/audio-interfaces.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 5032 msedge.exe 5032 msedge.exe 4508 identity_helper.exe 4508 identity_helper.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1284 1160 msedge.exe 85 PID 1160 wrote to memory of 1284 1160 msedge.exe 85 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 2376 1160 msedge.exe 86 PID 1160 wrote to memory of 5032 1160 msedge.exe 87 PID 1160 wrote to memory of 5032 1160 msedge.exe 87 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88 PID 1160 wrote to memory of 2112 1160 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.uaudio.com/audio-interfaces.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb117446f8,0x7ffb11744708,0x7ffb117447182⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11099119175706588286,15937378357365538725,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5665fb26e2c0e0ca115ba14dca04e98bc
SHA17c97b6549ee3166870afdf9dc390cab07a4c978f
SHA256dca0671281b52451d28fe814c5b237a7e3300b5a3744b5c569f5bbcd6795560d
SHA5125be3f447709e28f14401327997ede8b560aa3e49b4155f308caa2d5b447a2a8cf5a8f27f38c8b603baf9b6a79200d0ab480cfa892cad0dfb2defffb9fabb7730
-
Filesize
4KB
MD5acfa826257098703b9f74fea6ae217dd
SHA12d120c1e53d5180dae2ae70bab89724b51acb5c9
SHA256a9360339f5fc1e0f346563822218dbf8db5d34aa4f2f9279eaf642c7fb579e47
SHA51296eee26cd36a2eb1834b4b19e3f9e0e92f7273bde012fee81788263fff6af05ff7c60cd324c1589285774112145cc4c9d1429fbf518bf63d213219225d0db59e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
8KB
MD59f0f1f336fad48d4425ccd22d5852c50
SHA1142c5a2e7ce145f87bdc1d33f07cde8b58119e56
SHA25601cae1fb48adc1ede90018bd7c2f471ddca43ba72cb4e8fd9062dba6c0be5094
SHA51216e587ea0572cfff24ae2aff7ef958b52478839143fe63a3f3362075e51561bc4153e148fcfab31942a9abacb0b7514112355e08cec64071b06c068861bac6b7
-
Filesize
5KB
MD52126cce56037b88004b81bb7b477c7f1
SHA1f290360e1e2b0122c3ac339bba6bdbb2cb125bd5
SHA256c5a1681936d41997bee13fb116a9e5b0c24e91ad6963c9a55d91870bad9757f7
SHA51290166134b24e3b30ca0d9e2923c367ceca011a5a0c0d849f9fa64c5afc46b0d451f7b3641bf397e9827866ffb637824fe6bf003b79cca64b065432ce72165744
-
Filesize
24KB
MD5fd20981c7184673929dfcab50885629b
SHA114c2437aad662b119689008273844bac535f946c
SHA25628b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22
SHA512b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75
-
Filesize
4KB
MD5545ca6a9dc4bbc2446c619f4b3a990a0
SHA1b0aa431b696fb368c0973e9648c96ae8a0c39225
SHA256ff0b4372146505b3afc12f3760955c6bca3590344b53de887c2bf7c4ceb7331d
SHA512f90e2bb2bd76d2ec9424fa4fc7d3418d142ed8991d8a52eefef9998ec815713a8f7c38404166f336e172427afa3c6782ec58a6e0cdb70d360ecbc26fa2b3bf6b
-
Filesize
4KB
MD5a6226c115ffcfef274720e5a9c0d4025
SHA1fa6b4ed26ef39ad090d461860c47b8ad711e9524
SHA256194dbf53ae3392f01c08f18930fc6de50291845daea319eebb3aa5ac8b830f53
SHA512597d9f9cd93b309962086e667c0a52e5f292e6415c00fe5a6b98ae9f7b5c036717aef9680d6ab24282bd037404cf12219e1a9abab4c5dffc1577d7ff70403d16
-
Filesize
4KB
MD5a815ef16fd1f8847b15dcae95a2f0f31
SHA14fd01df64f4168d8d6d981eacaddfae970fb8bfa
SHA2567763a3823b635e845b4cba05536894f6bea5c2a71a6ee5f6766d5b868260016f
SHA51227364b508785edd9da785226ce76a38d46406db85372b3a411347dc66e8d25769e38b1a8d53b9a5f938cfba2efb93f02ec81054a35dc07b00bf477f56b47ade9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50af63560f7ce187a5cec6077e2614f0c
SHA1324ac7ec3168059d5ffa7a48c9c2ce8d194a63d8
SHA256233a02a296cc12084e8d1106f974dd993c3a96525b9ad8e6f0e1d9dbd0b2b5fe
SHA512299c1b3b48b7025b9b939fd9fc6458e02057d2a4190ec7c58a3393c06d00e330042d2f64200dbbb1ba8c8c9a62338080428f8a5526a5ddb2364b2695700b0aa7