Analysis
-
max time kernel
277s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://uat-hw.miutility.com/link/Activation/MjA3NDQ3MDU3ODM1NzU1NTcz
Resource
win10v2004-20241007-en
General
-
Target
https://uat-hw.miutility.com/link/Activation/MjA3NDQ3MDU3ODM1NzU1NTcz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 2108 msedge.exe 2108 msedge.exe 3504 identity_helper.exe 3504 identity_helper.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 624 2108 msedge.exe 83 PID 2108 wrote to memory of 624 2108 msedge.exe 83 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 3160 2108 msedge.exe 84 PID 2108 wrote to memory of 1712 2108 msedge.exe 85 PID 2108 wrote to memory of 1712 2108 msedge.exe 85 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86 PID 2108 wrote to memory of 1112 2108 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://uat-hw.miutility.com/link/Activation/MjA3NDQ3MDU3ODM1NzU1NTcz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5f3146f8,0x7ffc5f314708,0x7ffc5f3147182⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=1732 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,8987942205597304907,4126252059358720802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\28d3fffb-9834-4764-bf17-f0ea0af64622.tmp
Filesize5KB
MD593ad95f00cad025ce5077e9e983a17d5
SHA1fbd379e0230a1c531f0e06b036c3c670ec02ad6f
SHA2567c484e74fe5de0e0a490977cf68a2113fd883cc6d69d9ecb0a418dbb8a361801
SHA5126abdd04e163e1a511e146f1a0d0d37b35838ed5e410d7ba6dca2de97bd601c363add7665944c998eda417f80ef583aa9adb05ec770d5567846af41eeb5d1a8b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5b7d690a6bf5935653e74f5a004a1187a
SHA14694ceebca09e311c118634c2a1a6e396cb2cf24
SHA256a194cd813ccc7c3dc8e91ca944d4a3033b0d801c03f3dec927c2c1f442ac14fb
SHA5126a8ca3ebf8401fbd2904c567c83512a5d3086e56f6c245550386289aff83b6ac5b8d874fde1f7f1c334fbbafcf5a04e090d393c3cf3610d27703664e242fd0c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5f88091166e8608fd4e3ff0b456be1964
SHA15c3d5369cea2f43d65d88983b8a6de78462eb29d
SHA256899c303bc92dcde484dea3fbd4c4a7301f72da8a272f9b69704662c182fe74c2
SHA512b804cf974f104be186ca57a6f98d38319c45c9047a53fe1a029a9ff33e71ce0d6a0f6ea456aec1ed17451faa0943539ac1117aac7b9e78aaaa162765beff91e6
-
Filesize
1KB
MD52f369360822581df238ad92d97a33b76
SHA1189015459d2316708ad4361bfe9a99d1573cebdf
SHA256488a864010bea0be467f6577da41fbfe854a4a9932fc9c5f6a9f56929ba73c32
SHA5129f9b3422d414b008db8169237a229e3a3427a3eb467300b2af8acdf06113c6c93439208ec70570f239adcded8ba730d1353d78f97be1f07231a5838dcb83750f
-
Filesize
1KB
MD5643552952f007f2e9e510560c07ebe96
SHA1f380dde4214c710f92a4270d3371922c21ca3111
SHA256fa5300e90c2f890ec39b5d33fe6d56953aab9a7c2d753a5442ab4de8385ea2cb
SHA512a832a5cff54e6d7c13478d03cdffa3e99a3c00b0919903ce33145e3f2c233804039a41fbad9a798215ea762c61575b207ea74acbbc3f5d79cf27e32fe164e3d6
-
Filesize
6KB
MD59016a09a4613d0895dc816025410785b
SHA18d943926ac645f882efd5fdcf008006d6bd7ee61
SHA256d82a1e86c2d11ff3d32b23f04203b5a8a1688ec3176d1cae34b5b239bd09fbb2
SHA5120d3e0818c8fd454f6b0064ed621e04defdb4260d2960a9f88f0d66f80f05a1dfafa22a15ffc18940b0efe8dee8f9a24fa7ebe433b7bb1c6abd6e395a336f40bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e86bd4f0-29c2-4671-814b-b1c5823f1fb2.tmp
Filesize6KB
MD5f738248283cfcd641d9b12fe22cd97e2
SHA10557a48b53242b405906febecb6a1ddfb23868c6
SHA256091f11bb3e261db999d93593638f599ad15a9ba1547f7b527cd703ece3c860e6
SHA51245b324db99192fe5efdb948fcd8c9545ce1b161fb97bff425636c172b17558004717a524f68b2501d62a1e15d22eb4784cd7fefd3e26d06f5b75d54368b5c911
-
Filesize
10KB
MD50e6362b8b4a07c167396bfaffe898e42
SHA1dd65b797625ca63dbc838cfaca0bb5aa4470e640
SHA2561bdf304c08d1ce8d2b984e44e7a1bd0efe431657950e860b50874dab1ea29024
SHA512d2a90874f4cc9a1e12b625fce589619afe98aef133d48e7855fbe8279a1569fa206585a17135441323a5b970ec5c425c6a2df75ebcd1434edc5fbab582652747