Analysis
-
max time kernel
59s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 23:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.computershare.com/aup1?p=F5CKA4NKNG9AH377549ZBDF97G1
Resource
win10v2004-20240226-en
General
-
Target
https://www.computershare.com/aup1?p=F5CKA4NKNG9AH377549ZBDF97G1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 4536 msedge.exe 4536 msedge.exe 3472 identity_helper.exe 3472 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1224 4536 msedge.exe 84 PID 4536 wrote to memory of 1224 4536 msedge.exe 84 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5016 4536 msedge.exe 85 PID 4536 wrote to memory of 5040 4536 msedge.exe 86 PID 4536 wrote to memory of 5040 4536 msedge.exe 86 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87 PID 4536 wrote to memory of 4392 4536 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.computershare.com/aup1?p=F5CKA4NKNG9AH377549ZBDF97G11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d16646f8,0x7ff9d1664708,0x7ff9d16647182⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10691858902519893895,1180350966006853662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5c2801bef40ce8e9eeaa1aa54fc2cdc3e
SHA1dd929a4e11ad0b24e9c6e312653deb11ba1b8328
SHA2564ff63d998d125696f28cdc5b9bf464dc0dc0770c97a081983bc54f2e838038fb
SHA512e82bae898265309130d1c3125c5a265502eda64773ed297b2f44050030513c369481ce7bb1ff37e2e34e0184bb787cd43f6fd61da36439bd0f72a584ee8eb3b1
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5253ec24960ce02057d9e0e43c4a5b9aa
SHA1763a8132ba4eb8903d6e31c34d31ae0a2a2f4885
SHA2569e8c7f27a85af28f38cacf9a52e81c43f170e129ac4509ae0c75d384f9357af2
SHA512a8246ce0b2259886b423ec2e377be2f3be249f7d077d73bb94b0dc251186950bea483f0fdd0339fec557b3b14003d1c6e9f8a193b5d37ca3e288b422ca7f5b88
-
Filesize
6KB
MD5188198dc1f2e6263392a157a1fc23208
SHA132b19a5c095cae03fbf04b7c140d4ed452cf492a
SHA256ceb6f8e2886f723273752340ca7b8787d5c7c8f264048f12cdd90c98ed465307
SHA512a824a73f31b61f426882e278ffc22b568c85fc4d05a03a2cd20cfe8a844ea8bb6c97f0ee7e97f915a40e7d9a20252661119c2eeabb49bd02ef42675f4415d7be
-
Filesize
6KB
MD5d321b0248f6102340d3bb66ddb652893
SHA159f9d8cff8ca42cf3f87e1cf2960902493a47e9f
SHA256f7a6a8958ea800d5f4880357174b0e36d2dd907ad47a4591b1cdcf891211311f
SHA512004aaf812c0d58a6d63096d4a119c63fbb011a473384b28d3fb6f932c95659848bcf5dbc689e2cc0983ea08316c7869dc4fccce4b56a031957f12bbeb86fc5bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59cfd4223b4fd238130799c0405133bde
SHA15d8806c8a227eda72a58cb680abccff8e6e839c9
SHA2566095ce6ea8654422fbf24df56ffe9be74115a50797c389f317248ea4fda95f56
SHA512a81e7821132e09eb408064443eaa48d6e9e4ffc0df260e73c382c3fe293843fd8f402073ae25b55b1ba8014f4f95b89bd45360dd2313efb9b0b4eace75554014