Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 17:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qptr.ru/sqrD
Resource
win10v2004-20240226-en
General
-
Target
https://qptr.ru/sqrD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2468 msedge.exe 2468 msedge.exe 1296 msedge.exe 1296 msedge.exe 1480 identity_helper.exe 1480 identity_helper.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1296 wrote to memory of 3444 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 3444 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 5012 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 2468 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 2468 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe PID 1296 wrote to memory of 4740 1296 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://qptr.ru/sqrD1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffa0a0346f8,0x7ffa0a034708,0x7ffa0a0347182⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1464 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2732 /prefetch:12⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,10399743033354891518,14443717309056996622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
175B
MD55ff168352ed745e7d16469cc528c72be
SHA1ebf743a5c3a214317561cf8dd3e670cbc54af2bb
SHA2569f80bd4b79a8c21da99cecd38691149d130b818fedc14b9c65ae69640e4bffe2
SHA5120cea599001f2c0ef5c663ead59fa63635aed14fcca35ce1483cafe1c49c373401192d2885efa8396b5055519f18578cfc70dbbb8e645374ed1dd71ac2936303e
-
Filesize
6KB
MD54f86c42c97161d2c945627fb13a7da87
SHA19138343d704d792db09062ef0e6d858e9a5c52ef
SHA2562b2df746e6be3a4a3950d037694d1ae00d9a8f6850024255fd85297dba29ab71
SHA512379705f6e8fde5362ff4e22ab278417cd6688d7e36053db6fec764cd666d7bba1bb9a844178d36cc10e0a5878dcf668b127a56d6dc25b84e1f2891062f84f01b
-
Filesize
6KB
MD5389eb4b8fca1b78329794bda7b96d289
SHA1ed1e912e50c61ee3f181e89066521876ccad0307
SHA256a906e89a8fac88c76480589a16767aa9a5e51fc3f9075524829016d633702333
SHA51231e691f2166ced68e865cd1e1e66a1c15f104965c77a200430a8d2e86fd7c68fb1d2fadaefa039ccadb0cc04a11a69772c52fb394e7f014d609bf9992e3100d0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD519323720c6b5ca5bc26bdf0660483fdd
SHA10ece3e4e5645abe2f64cd85493e4261d4b85ca2b
SHA2564bee78a9fb373f0b3caba3de66b999a1f21176c1d0d674debc954dedca1273b5
SHA5120ce863fa505679253b6e9e140c4c81eee8a5ec75cc5baf639668577f6d03ec4ea5ae24dd83f8951231eb92a21008aee40f3b4f05e7a3fbb69529dd2622249576
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e