Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 15:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ubuntu.com/engage/ota-updates-iot-guide
Resource
win10v2004-20241007-en
General
-
Target
https://ubuntu.com/engage/ota-updates-iot-guide
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 4696 msedge.exe 4696 msedge.exe 316 identity_helper.exe 316 identity_helper.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 3068 4696 msedge.exe 83 PID 4696 wrote to memory of 3068 4696 msedge.exe 83 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 3648 4696 msedge.exe 84 PID 4696 wrote to memory of 2108 4696 msedge.exe 85 PID 4696 wrote to memory of 2108 4696 msedge.exe 85 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86 PID 4696 wrote to memory of 264 4696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://ubuntu.com/engage/ota-updates-iot-guide1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae5c746f8,0x7ffae5c74708,0x7ffae5c747182⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16596442876911742273,13354160359234224412,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
178B
MD5c712357ec05b3e2cbf2df4dc2c7ff3c0
SHA1fce7ed41af16ded9789842f1d9fd0487865585fd
SHA256881b269d1ec32135883da623dd74bf806b677e415f19acf90dd597eaebb60ae2
SHA512a6724b9c2a3b670b4a85fed93fcd6cd8158306fa20630f09cffdde4da9a0d8e1ecc8f110ed569f3ecbcc79c8c4da50d28292af17e5c04f972fb15e01bba6936a
-
Filesize
6KB
MD5fbfaad972dd02cb0b728ec8628909158
SHA14d96197a9ce96159427ad5e44fa9665e566ccccb
SHA256babcaea59b0d1f6eae77db1825f6ed38fc953673c0cf95104bdd87f73e639c65
SHA5128c5868ab008a61b4e458a85b60e9ae6596f47c5debd2aa0be896caac2995b74f491f027df40390a480cd37a955e1e9a0a0664ce81ecea3ea7872bee9d473dad8
-
Filesize
5KB
MD51772870cb625142d95895821548d2a45
SHA1d369e569512b91dc1712a39d72a883dcc9ef9190
SHA25685d86dd83f019d645bdf5e79de4cd312abc6f098e8b89865f7d5f71fad2e2b5f
SHA51268fd8303fd745d47451fa421e9ffec4dcd76c94b05781974b30fd22d6602f6900deab44b91d8d39172abeb75df7ee8a57729c012b4aa2f64e753b2d39db56c45
-
Filesize
6KB
MD5495627c66dc35c0ea672fcf4ea1c99a8
SHA167007cbc7f130ca63eae70bb9a949634dfb4d998
SHA2563ad9b1fd5d76715cffe071ad7a77c83692638c6b4de762e11d080f4400272451
SHA51298b2569e1f5897753bdc8761d2f4d8de9e8c15c9d39f06b77d7c3f91e9492b2328895066b82439a26f5a8f8ae3ccefcb401651c22d7c23ed4a3e4deb7c8a2301
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5516bd3f6a37ee7668dd6cba9b7439966
SHA13ace3ae1213a8e8e8dc6d7aeb65a7b13e13cb592
SHA256ba989493c9f8091900543c85524d3c3f188ebc6ab7eb809165901ac55225e94b
SHA512383d957bbf6a64274284c3b2039c56d41b1a829834010e537ad56e5c710ba2b9b6bbc49af9a5a988323e9f32bb3c228fa2dc57373fd85d04ba4d999be4740e0d