Analysis
-
max time kernel
315s -
max time network
322s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 13:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ca.store.ui.com/ca/en/collections/uisp-wireless-airfiber-ptp-5-ghz
Resource
win10v2004-20240802-en
General
-
Target
https://ca.store.ui.com/ca/en/collections/uisp-wireless-airfiber-ptp-5-ghz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 432 msedge.exe 432 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 3092 432 msedge.exe 85 PID 432 wrote to memory of 3092 432 msedge.exe 85 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 1308 432 msedge.exe 86 PID 432 wrote to memory of 5112 432 msedge.exe 87 PID 432 wrote to memory of 5112 432 msedge.exe 87 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88 PID 432 wrote to memory of 4856 432 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ca.store.ui.com/ca/en/collections/uisp-wireless-airfiber-ptp-5-ghz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd76f46f8,0x7ffcd76f4708,0x7ffcd76f47182⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6513721395053393912,3692755326454575729,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize912B
MD5a9cf9b18c260fb77ec7c1ecc30f9b4d9
SHA1028b7f28bc7b2064f400062cd8ef9a9f6c1cb7f6
SHA256e1acda99fece669f9e07c11d5627dea4644fa7eda93ba42bda615634611a53d3
SHA5123e1adac599a32c116ef182f2bf7d0608f72365a4474b3c6664ce1ac3f511f4d8d3715b565eae4327a1cd7d2fc30831b2e9feade1369e4e8a4fa4ba675732f354
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5891fcbaea81548c0f64cdf70660b9304
SHA1bdbdd320e7b44e68efb8e3edbb320114a6014ebc
SHA256a37efcf02b4c28394b3f61e211c515fe0befee82a04eae15f1d4cd5fb2fb95fc
SHA5128888bc6a5600e0a7ea53dd7dd56be7679ffc9fe4456b200165130a181d3a45bbc017a7118d7dca47aeb06a2d711c0984aa12b5f0bf6eb48ae5466ff57d111325
-
Filesize
6KB
MD53128883597565855b5d6a96129bb820c
SHA11eb1e6aad92b67de5319bdc10c9c32ec208be44b
SHA2562a79e5a2046608e367b90128f37c1fc129cee398c7a732ead1c0c6d5c116bcaf
SHA512e95269e44fe884e38067951f541daca7a1c996e385162d24cacb65a30cf8d44d0afcfc0c03b4ba3b836bccc3e5a4b0db816d62998ad1b574a31bd02110e0b084
-
Filesize
7KB
MD53494b685bd81d26c1167507eae55d1ea
SHA1185307aff6b420e135559797bd08a27b6580fd39
SHA2563d1fe4389708f2296f6f7792dcb4c0e7de50f62c845802303a66e3342da37b3e
SHA512dcbc930266c176e92d0d6b87cfe63113e4872a22e5571b6684453a91d29cbfc489606394b876fd5b30493eff051e2fd5c8d3db9291659a92f8afca7dd59b7be0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e44414e2a9878018d5e0c0a57e0a9a1a
SHA14e174d19afa83b93df17bfb19143d14f405f7768
SHA25683a8d8feda8587e3d99669d307a4923d72e431a5563b06aef046d698b93ee0ef
SHA5127c89a20dccb540fd02bb5526013875b9fbc7e1f38283e21476c01f7f089faffc2c65f321802504ff44e48c4e088e455e4389bbd367e1c42f6623982dece0fa5e