Analysis
-
max time kernel
52s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 11:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://unevenbeet.com/0/0/0/51418f8092b6833a4404585f4272dd65/gt
Resource
win10v2004-20240508-en
General
-
Target
https://unevenbeet.com/0/0/0/51418f8092b6833a4404585f4272dd65/gt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4148 msedge.exe 4148 msedge.exe 1132 identity_helper.exe 1132 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3776 4148 msedge.exe 84 PID 4148 wrote to memory of 3776 4148 msedge.exe 84 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 3704 4148 msedge.exe 85 PID 4148 wrote to memory of 4944 4148 msedge.exe 86 PID 4148 wrote to memory of 4944 4148 msedge.exe 86 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87 PID 4148 wrote to memory of 5084 4148 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://unevenbeet.com/0/0/0/51418f8092b6833a4404585f4272dd65/gt1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1fe446f8,0x7fff1fe44708,0x7fff1fe447182⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,12435268984411446156,5995704618824429012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:1500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD50e27d9bd86474d202f0a170df7566e1e
SHA17e07cf9176c01e0eff8a9095308f28bca1d6c595
SHA25699aabb2cd458f78bcdd476c96b532df4ef6848c1af5c111e10238d3c725c5c8c
SHA5120a5a6b8b0fa55507a66ac71fcfbe54cbd19fa5e8a4411a9a0436715d81b313d64268ea2b0ac708c2f50ea2822a80b83ba67dcee9af579d25e1682b3cabdd0f08
-
Filesize
5KB
MD56f3ac305b0f8c96a98ae0528daf5b4d5
SHA1895f1504bfdcde20c6d4a2ac53bbe94802f21014
SHA256d6fe89eae8e3f8b6f60668c33d577aaa68eab801bde930b0f295420b7a5e682f
SHA51202b930868fc399bf7b8a89b6b91d2da6fd2960629402bde969dfa8456590f9e47df4530543e4fa443e5fffdd54a0e1323d90756d7a698bdfde6e5eee495e1fe5
-
Filesize
7KB
MD5143e3fc02d1fd58e1bc5fa6a7ad2966b
SHA1fd9be60a23d3dd0c3dd2e13c8fdc49308030adcb
SHA2569fb81054bc9b3b41addf5f08379ed7f53295fed468cd67cd83acc7f3cbdd39b0
SHA51252250c734c9f29abf6760410bb7d80f65b6df33754eb14d7457d287062b58b6b0d32145e672faf569d846761bfe064897002b0f9e30efb7844e4a3bbb113eed2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD57363bbfece66dbd34a2b17235809f33b
SHA17a062cf7bddcfe276c722bbe736d96bd9e9e1616
SHA25688415c79b4c573387369a927b2de498b8cbba1b4ce3d61f4c967bb9085c6bf96
SHA5122442502ead10497736e4a17a886cdc2f1b9bf54d6493e3741de676b5aee2c958a98bae3cab051a29af0c0147a55217c00a933de84ef3628345f611346d0f213b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57976d.TMP
Filesize48B
MD555e201efabb13654dd1d3d2eb6e116ed
SHA1b9c27cb2a7ffd6b9a03f960a132fcce52b06a641
SHA256eb625e771ba601e64878660159f2b40255f94e8adcc061ff3bfc8a7837daaee8
SHA5128113c28da30a06501b0030b5ec5f75950e6d4d8fdd955db6a63c894fab364aac8fe840d910ac7041d55ed8d6028bd12446669f2eb7b97269738a2965238ea061
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e8b7059e79cdbbb42f0fbba3baac4ad9
SHA10edae4b36ecf73ad41c2646a9c7a327b0f5fa436
SHA25609858298ba8ccb61bc411fde532ac7faab02aba330c688e5d2d6cf73016677ea
SHA512244d9fe3eaf37705bcd039184257b945c08225302b7ecd375d5aa1d66792ebc8194d163fbec0e84f9426ced2416b5febad8304c61a2da33d184004057ee56b78
-
Filesize
11KB
MD5e8779686e069536d03c6d2bff7f04388
SHA17968dd255c2c4d7fa4f3015922e282a5215cdc8b
SHA256dd7d98f967a952d8ced3bd6d90f39fc35f30e8fb371db774af379409cf969fe0
SHA512d542bed4ac2ba38355883bfebf62197714243fdc12fe2e30f3f6c6dc04b5279cb46bf6fb1d8cd5c8396110152972bb8e82d0fc7a90c6489545363c7b43ed716a