Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 07:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www2.universumglobal.com/e/13732/4dWfsqB/k5kh4m/816120853/h/jAzQAQAT2faIG2fLKog1V0tYnDvXNLe5K5NvMCX37-U
Resource
win10v2004-20241007-en
General
-
Target
https://www2.universumglobal.com/e/13732/4dWfsqB/k5kh4m/816120853/h/jAzQAQAT2faIG2fLKog1V0tYnDvXNLe5K5NvMCX37-U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2056 msedge.exe 2056 msedge.exe 2712 msedge.exe 2712 msedge.exe 2764 identity_helper.exe 2764 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 1572 2712 msedge.exe 83 PID 2712 wrote to memory of 1572 2712 msedge.exe 83 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 3940 2712 msedge.exe 84 PID 2712 wrote to memory of 2056 2712 msedge.exe 85 PID 2712 wrote to memory of 2056 2712 msedge.exe 85 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86 PID 2712 wrote to memory of 2340 2712 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www2.universumglobal.com/e/13732/4dWfsqB/k5kh4m/816120853/h/jAzQAQAT2faIG2fLKog1V0tYnDvXNLe5K5NvMCX37-U1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8666a46f8,0x7ff8666a4708,0x7ff8666a47182⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=5396 /prefetch:62⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2684 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1425833190651621183,2745661568994203006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:12⤵PID:3908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
6KB
MD5583a96e0504be5f3627df6cefdcca3d5
SHA1a5cb5cb57bf12eac415ab255fb9e4d33e56a0294
SHA256c26b42b2956e14c4c8454db5b503f25ae15757e29660819b2895e47a281ddbfe
SHA512e5a11155d93674d1cee04c1881f68601e71814eaa594775ce182705335ecee8e2098f5644df4b53835b616e372cebeb0b5c04a6ec16fc1864cf249ffd65a11a3
-
Filesize
6KB
MD5bb708122c965c0a1c2015db7db90752c
SHA1a8cee75c181039608e4ace29ff0f9603c1399b18
SHA256199a2051db880da9efc6b9bb04b1276268ad1483162adab8fcbf3a2432a75dfd
SHA5122d91b06e50ee1a9c4ab88385229de7ea7acda79039fcc347a8256e451e2841a2919bd70a898d71cc66e54cd35bdbb7f919554756e0a30db11f756a82a0fe36a4
-
Filesize
6KB
MD56ad8ab0bb66c038b15e50cf3e163bb19
SHA146c149c9051a668b6780d793cda17fc57cc3e8e8
SHA256cfc7f109f38f2307e3f6a96307cd762a8d1e565314265ccb645efee867db6c48
SHA512340f31e0ff5785f4dcbedcac0c78384f67a149ea838eba11c4fecfd5468e42723b09c5a3b5b8cf54950c1b8cd50bd0d85c44df771319d0a96f265fb018b7cb9e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c5f43c5e1f9cd245fa7fb95eb4d4ce65
SHA13bb504c83dee197bf102f3aade35c7580026e959
SHA256c3f10df333782ea7dd4eb175b3d7d88265705a6ecd13837f02cb6bc5219fcb08
SHA5121f1a63134200d8b5d49e58fdf1180e8bd84f53d19e51fa54906d194349de97e216c135f942e2f5d810643907962d4329effab237c97aea1d6337bc40cd4db0c6