Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 07:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mx.unpr.it
Resource
win10v2004-20240802-en
General
-
Target
http://mx.unpr.it
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 2184 msedge.exe 2184 msedge.exe 2320 identity_helper.exe 2320 identity_helper.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3288 2184 msedge.exe 83 PID 2184 wrote to memory of 3288 2184 msedge.exe 83 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 4008 2184 msedge.exe 84 PID 2184 wrote to memory of 3880 2184 msedge.exe 85 PID 2184 wrote to memory of 3880 2184 msedge.exe 85 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86 PID 2184 wrote to memory of 4756 2184 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://mx.unpr.it1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e84e46f8,0x7ff8e84e4708,0x7ff8e84e47182⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9697596372484246611,17734093153952309527,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5da97922ca91c1f809f066d35a47453e2
SHA17c3d0f8224a6a7a2d4beca0f772c95f27d2ea6c3
SHA2560f190f56e57c2039b1d1431adee19f932679b062d7809e7c0930174f0567602c
SHA512ddcc7494222933a3db7af6f3b15ec8623db0299d4f7d46d1618cfdd2879955a4b34453ad6d766bf17e131fd5bfe6e4ec1c5d10e18b8cc9e500615028c29d283d
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53ab718a831adb857d5a17e9d782d896a
SHA155685e6b7eec064b070fabdcdc773252f3c880f1
SHA256f0d9475de26a154474e4fe6e3d4a86d7364cf3aa7f730fdb2eff40fef2494f84
SHA5123591e1d56361354b2ab1ecc9de0e0339ca15908b3fdd378a6c7b359d753b7f80d9f023d62040c90b72f8d9c382ec1868586cf417bb4a5f3595f4dee878678857
-
Filesize
1KB
MD545a409ff79f474980e2254c5a1fe204e
SHA1672335e8f4b1c3ee600ff57c03af8be9a8532853
SHA256ab2c4fb0f0e55d5c07869a79971f4ad5abd36ebbe49030633f7eac51d8f0542a
SHA5125ed495db84bb6aa4c336d638c7a6be0468da487bac58e464ae0a7c97fc65e6673d176af2fe368fde4ebf60a1a95d522dc96ea22344faf2713489e169e6993b57
-
Filesize
5KB
MD586dd2d9b5ecaffadc51f88f8ba02e506
SHA12cd8dd4f13263ff8414b394620961a10bc0c24d5
SHA2566faeff721a5d44890dfeb58a9787acaa44f2bd6429a11a4510c44f2f6337768e
SHA512b54a4303665640af733773b80c979eb8c68f1bed5816cd5a3ef676671ff778b103e674fd9bac05a6c3160a9c2b93bfa9821a61623a371c1273ab1c0c678a37de
-
Filesize
6KB
MD52c85592c3ca9c2a6754e6ef4571a5457
SHA1c087828bef41a84f0e2ff3e8e61e68c8ae1425ba
SHA256252ac1b0456b759d465f9b5f948755dd25231b5f89f8edce55d5e6bd8de5855b
SHA5127863f19d732d0b63f2c0490466ba4e5f781ab57bf0797638af30926752682178cf44a81cdfd3519e7c6d07795d17413be9452e34a70071f8128bc9b791b4b6ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389