Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 08:32
Behavioral task
behavioral1
Sample
Ammyy Admin Corporate v3.5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Ammyy Admin Corporate v3.5.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
sainetco.ir.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
sainetco.ir.url
Resource
win10v2004-20231222-en
General
-
Target
sainetco.ir.url
-
Size
207B
-
MD5
5b209599e1fd1c0ad77f7be78ca6b837
-
SHA1
e343809d0528d696fe2b0796da6aa1d73ac72f57
-
SHA256
022030c51ccd5e05a028b9d2f5ca62dab950983e91840be1526eb10921f3961f
-
SHA512
7cfe50ee60fd89f6705e4efebcb51fe99773b84ead6de20c689cd933aa15e868a0e70cb8164c4e128b4b1893bb53ad687ef787dbb5507a04214e604acbfed68b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 576 msedge.exe 576 msedge.exe 3032 msedge.exe 3032 msedge.exe 2600 identity_helper.exe 2600 identity_helper.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3032 3708 rundll32.exe 86 PID 3708 wrote to memory of 3032 3708 rundll32.exe 86 PID 3032 wrote to memory of 1584 3032 msedge.exe 87 PID 3032 wrote to memory of 1584 3032 msedge.exe 87 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 404 3032 msedge.exe 88 PID 3032 wrote to memory of 576 3032 msedge.exe 89 PID 3032 wrote to memory of 576 3032 msedge.exe 89 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90 PID 3032 wrote to memory of 4484 3032 msedge.exe 90
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\sainetco.ir.url1⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.sainetco.ir/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcebf246f8,0x7ffcebf24708,0x7ffcebf247183⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:83⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:13⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:13⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:13⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:83⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:13⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:13⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:13⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:13⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4684829220548799812,15861279812511099529,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2680 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
Filesize
192KB
MD55036f7c363373f5d9cc2b6519806feae
SHA13caf2148a2eb7c82f9aff0f3a2f4594ee70327bf
SHA256715c5d3e3839c1b47c3008e8a89f929e60858ee379724a20775003c692e9fd6c
SHA5124661cd6fb02dccc48a42fe127b1e88f7e794cd4eb1d8a5a8f5075f772dad63211efa349bab579c5bb81bfb2c4b1be201c6725a56f617f8913a2235e3565fe645
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD55e04a6af41a5e7467d314dbac358b246
SHA1e7a3f201874abe27024de56bb429a4963c437dc1
SHA25651a3f2258f13bc9138b82703330f61f8e4d3b3ca0abe92a959d81b92287bbc52
SHA51261b2a6ebbcf00eeec3c650ddd1d9ec6f87ab1b499ab6d8e5eb27551e318a1bfc8bee1646fb04f137ba038c76d3f0e345534884934234e9880d34333012f54a52
-
Filesize
1KB
MD5339e7c566ebc00972b1b326200aed0aa
SHA1fe600c64a19480b24152ef1c70ff324e196e5709
SHA256952aaebb40e467967d5f1a61f4c1a400a40f44111c56545625b1ebf4fa33a663
SHA512d19f305e10d2c7634fbd6334e7d1bedf8563caec0a5d4cad99cada0e1209e61ae7f3dd79ccce9167fc6c0e0e49c7e69015db9cd7fec0f20bb47cff82ac39c18e
-
Filesize
5KB
MD5e036ba8a1c9b31decd9675ab249506ab
SHA1b2d3708082b18a81f9d67fc3f8e3b209eba0f3cf
SHA256c995f8f6ab00db312a62f20180f486b7a81281f0f9fd7797f1fbc7aae045814b
SHA512ad49312f367ef341da5dcac9002a06649439ed751f16cec40bc1528e7f6def376654ec03c57b621aeb8b26b0b82cd002d6e356b39499f8ef202b418af4e1ece5
-
Filesize
6KB
MD5b78d0328960800797ea14b05b73cfddc
SHA162309f2c8fb8a2b7774885cf0ded456e76affafc
SHA256fa05b07d9c1a45737a18c357fdb25aeaeb28fb25d8a520da187944bc0d813910
SHA5121e7ae9848f4698542f78988bda42acfc53e4ff18e189f3bbf9335ad0f8bc72ba83791375d98ccd55510ca169a910a090fe667e194de85d15b05a4d4be831f2ce
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD595944305c4c3de8c81ac1a7443fc4022
SHA10eb13e8a27b054f6a58432761aa6f3843d3a3347
SHA256288696dbd2a71a760ea68002e3212617a690c4a064e1e66555d72e590ca73d5d
SHA51224eb2c748c0befebb573a870116d55aeb9adebecb12ccd23c71c51c2c1ff9147f5652941b8959a16034db454fedac97432e36acc6cbe9335576e56e2d47e923d