Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.sonic.com/#:~:text=Whole%2Dhome%20WiFi%20solution.,system%20is%20WiFi's%20best%20friend.
Resource
win10v2004-20241007-en
General
-
Target
https://www.sonic.com/#:~:text=Whole%2Dhome%20WiFi%20solution.,system%20is%20WiFi's%20best%20friend.
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 1192 msedge.exe 1192 msedge.exe 5104 identity_helper.exe 5104 identity_helper.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 452 1192 msedge.exe 83 PID 1192 wrote to memory of 452 1192 msedge.exe 83 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1504 1192 msedge.exe 84 PID 1192 wrote to memory of 1648 1192 msedge.exe 85 PID 1192 wrote to memory of 1648 1192 msedge.exe 85 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86 PID 1192 wrote to memory of 4216 1192 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.sonic.com/#:~:text=Whole%2Dhome%20WiFi%20solution.,system%20is%20WiFi's%20best%20friend.1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc0e546f8,0x7ffcc0e54708,0x7ffcc0e547182⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,4383044456889210630,14710589916494649106,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5a0a49a5dbd206c487fe82de6af75534d
SHA1284c8faf8584e019ca1804a9944c17790863b8c0
SHA2563339b53241bd7093788466eadf97a5b6cbeb532a2337cc26b10ae3e35ffd1791
SHA51283249a01645325ef712bc0f61a2f8788970f6eba5bb2736b8d4a5163aadeadff1dfdb7a1357257d01c93ced8e1cb942fc9d62a8d15788446936b98ffc52446ad
-
Filesize
2KB
MD5e2fae0a161442ef077991387d0a0b57b
SHA15e1e347a849af5a2a918a2b1584d1b302839749f
SHA2569b521c75ff0b87c9fa68fbf976132412331cc4cdc2e29321714db41736ab9cef
SHA512b2c961ced303c174b4aa60fbc97856dbd1d93d4ca8d0f6110b353a3cd13adbcd4fa9540209f7fc2686e1770eb475f9921276ccad3138924131b32155df5e7085
-
Filesize
5KB
MD56e09495e4671329a75e55d274f3fc642
SHA1782ed38d32a3832cf320397dca79ac0482875b1d
SHA25678e582a91ed975ca44c741d2dd00c42bc677f446d9bc9a8f2f8beac310962e43
SHA512cad178b15c220d414d98ed20739ee4dc2e64a53043728d9764b2e97f083d9f4b21898482816826c6e11d83087742813a6cf194b1906badc6f6dc02eba7f46780
-
Filesize
7KB
MD558f537c709eb99cb7978ff30eed1ba4e
SHA1cdd4026ecdf227219eb15a69501a3e6d7bd6ce3b
SHA256f80dcafe83c9684a51f2edefaf441d9e0e8d6d6796d8cfd7fc58dc066965863a
SHA5126a85d9ee7c1a5f82dc426ea34c983ac9ade149605db98771f360742bfd3e2ef3104553b74a6d65d74a6bd321acfa32abbb4a86a7184e47d649a0c048ec7fd083
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5ae765d46f802fc5222a09ef8a2d96de9
SHA101c531a5d9e33d20aaa3693162766de4260e08cd
SHA256fa0384136298108923a8bba788cebd1240ed09274377b33b0251a50fe0dce4b3
SHA512c78ffdccb6d0d551bdce2eff721ddad1a7698511df8c32c01f57f553bfb9bf339fad2c6c1c4d5cd9a4b20d9a6699ab76539421dfeb80ef3691d778de67bda486
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe580d0b.TMP
Filesize48B
MD51f085c981071400b57f0161cc6b8d6df
SHA1439b388dd2646669658347e17fe4f4bb7debf2e8
SHA25624a7f293d8174c40870ffc7af531b09421802fbac4f78b1223f6b726aee36aed
SHA51260e7fee6ac61ca2aa8a98d2f14903c8028e1323cd7f9c5b65fefac985fc2e1458a1b73a72d28ace6032c1b5a4037ff649e9b8643014bfc0fe525350f24e0b3b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5671ddd9478745c0ca7ccbef716570b75
SHA11119dc884de94dc7c65e98b0793b4995b31731a8
SHA256463c3f83f6d04242c0df675e96f743dacba5dbfa7edad78905df62b4f142b8c4
SHA51223aa5b35caa854e54362373da36b392d0492311650c27bb6963a8b557b5e78be3ec4d6f60f37766a6f469e5ca6e21f4c8df0b8c51d78689922a37f3c77089717