Analysis
-
max time kernel
104s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 18:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ui50o.ru/c
Resource
win10v2004-20240419-en
General
-
Target
https://ui50o.ru/c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 4968 msedge.exe 4968 msedge.exe 4680 msedge.exe 4680 msedge.exe 4948 identity_helper.exe 4948 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
Processes:
msedge.exepid process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4680 wrote to memory of 5084 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 5084 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2480 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 4968 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 4968 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe PID 4680 wrote to memory of 2792 4680 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ui50o.ru/c1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83edf46f8,0x7ff83edf4708,0x7ff83edf47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,2714358393199976700,14929418015858184998,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD5d0bc8dfb28526cf7e3d8a6be246f7b6f
SHA129ec08ca89420fef64c625d88165d1d05f03c026
SHA256ae6865afdedc96b1981381489d99ba2a39de6f1d6dcd0127ed58be75e0fa9834
SHA51294359dbdb857dec8f292b3577386bf2579b364081eb0e62f16ccf6aabac19a8f7d63c0513b9fb26f5ebbf1299c963847189e61b618e13e1e0e4980fd9ccb4101
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
616B
MD5e4c0fd18c8fb0d54c6af0c7e01a33940
SHA167b8c289cf26d8dcbb337baa6327d87619e5c4aa
SHA2560491035d57b1c6bb7ba634a07fae9f10ff06ae5123a41b00de71748c409237d8
SHA51271da7ca062c7150f97015015db1d539bf38dbb620fc2ecca40383f63d5d85a520554f9fa76927eba721d93abb02bb310354866d1970acaa945d3d47ea53e9059
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
616B
MD5509d6f234d3bdb85bed42d6778076fa4
SHA1aa7e04a29ab40bf8a80c2cbf8bb1441376acad74
SHA25637e76c773e9eb1d928d9f3080c353dcb80e3043fa6a9ce2b7d3fd2ba5d959380
SHA51297ec850942737c876c6ad7a2c8699bf90df1e62a79e2d1de73a18c1f0730a5c05118ff0e2156e5d8c018cae95c09f250013f3a2161e104ca35206163f9f58b84
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5eb071eea48fd5102fa906c93a468741c
SHA1e2897b2da223183a85b8514a4226f9b458922822
SHA25665c6d998a63252a7f27a66e31eb760125f50d8c9a77ca72180f2b69821dced6b
SHA51219a13e6643ee753ceaad6d0ed2e758ef4b09b8f2d0ebe524774c3fe06bc4fee15f58399e6b3b25ba59f43099b1af131f32f2054039309541a7f6aa77d1d24bc2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD550b41e7bb08974d54035ec253f3814f4
SHA132d2c3e3725d9ef0cb5ab74f10342608d0c571c5
SHA2561de9d2776ebe56784163c12a1ed4081b9136b7ba0d17e3c2e79b54291895ac5a
SHA512204b4d9ba7d81a9a3a5c26585f2a36af63bad5f7ca43267f8c620dd0c7cd858dc3ef9bec0f402f09201c1b991c31d25544cd458bc235c6f9f3d53e9cc3b6f249
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5058848ce98adddfc52846a943e87149e
SHA1244dafa1961fa6e4b23a984d86cb4808e3250b03
SHA25600815fb218f148c4f142a6366b477c41eaace9b04c9a4244458de9ac13e9b6c2
SHA5121acff13940f8502e4d5e2b3cfa1c4d48ea5096dbe9637818a07c3f60dce350097d5ad94e30796194395083b0add64eafd1c2fa9fa0e02ccd88034f9cefc11c91
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD553e30702ed14d4921168f65787402c52
SHA1512a299cfd7ac6831a6cfd26559a8975417530b6
SHA2568dcc82bfada3f73f5bce5c48fd5180971d09cdf971d1f6271c68ff8b969ad33d
SHA512b80c3781dca8dab1907dc5ae68231ccdb45500c306e535976abc42ca7f8ff082201181ec8e6ca1a3cca58450ddc7623eb5cb30559bdbbac8ad1646765643a51f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD514aac47292c6e81414a05b2cc90248a8
SHA122461406086c1e22912d4774ccd0038245f98a4c
SHA25613a7fb1482bc629495ee3f2a57aa1a07cde1d0240e5a3af0de13a367adc99317
SHA512cfce6cb85f2562e95f738482dbbe221648cfaf644e77107085b08fdbe0de1bb5aac1cd4fc508eaf780e8d65fbc640e60149ee69bd6026c4563606121477d1f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5e63396e25bd181e54102a29ce1c4aaf3
SHA19edf9f7094d10b282f77ef8f6971df0980405498
SHA256059fc2d203b569f8a7089e351d9cf708cfeda74c04f6b6c54022a594849948a6
SHA5121b291da07cf19f37ffc6e9d38f84fe40bdc0b6a1c67394aece9bdfd8fbd235b4b4e4735b19693b621d06866469025dd0d9f770d0cc1a7cf945a2ab7d949a596b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5a825d6870cf5e0f3c41fba017e8d5587
SHA114e47cfb54cebd4abb47e3bcab8d5a33245ac175
SHA256d2e6838fea21013055a26f005519632509a0b3ffa007dcb240b65eee7da82624
SHA512a186131c5f97a0f3295913b761b2e1bd021b7469aeb14212611d33e4afd45717ac969c6f3fb231fbe1dd96c58310ca965481ccc8be4ff3ea947af6f4ab201c23
-
\??\pipe\LOCAL\crashpad_4680_HTJQZWBGUHNOHKBNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e