Analysis
-
max time kernel
126s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 15:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://p.updateinfoub.top/us
Resource
win10v2004-20241007-en
General
-
Target
https://p.updateinfoub.top/us
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1532 msedge.exe 1532 msedge.exe 2528 msedge.exe 2528 msedge.exe 4548 identity_helper.exe 4548 identity_helper.exe 3292 msedge.exe 3292 msedge.exe 3292 msedge.exe 3292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2528 wrote to memory of 5108 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 5108 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1644 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1532 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 1532 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe PID 2528 wrote to memory of 3516 2528 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://p.updateinfoub.top/us1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd875a46f8,0x7ffd875a4708,0x7ffd875a47182⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,6709774724807254414,11198838359685035402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:3708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5d56b961c1b170c2cffc51c416a20e860
SHA15668f8a3dd28f9042915eba6a33176a01ec96728
SHA256b745954cd53eb77817ccb1891bef85795caeb874fd922f85b26e8558a1800593
SHA512e1635449d5ad4857946b5d74c3bca6265aa58fbeab2e984f10bbba0ad3b42aeb59f4903aeb886227a873e62ec90cb943da318421a28707b99a9ca2e964a3dc39
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD57a8ec7a37462e93e41fbcc3b6177f0a5
SHA1df704303b9b04565773d66520327209e7e89759b
SHA25652f0e6509e7f3d00a398b9bfd0738d4a360dba70850366d67a6b0f827879ca89
SHA512dc13be562ddc2b3b407d83ff295cd26286115b3ba921892c31029e732ecbf4cd704eae196b4cdea68e88d258f4fc0a116784917a9d8b6801e26d4a5d82107f92
-
Filesize
186B
MD50f1195ae4b4a943d795a7fd58da0f568
SHA17aaff03fb4294a3d2ee2622d26d1065cc67de72e
SHA25608cfaf1982c6441fa4e6b17813d96f1e42c49b61f2bd44cec90ea5e22afe1b39
SHA512097c01549c69ed8fcad16036dcb432b44389c4fe1c6de759df042fa07b54cd2791404896c03d1ee556c6784835584729119cb63ff96511ecc72cfde808a01272
-
Filesize
6KB
MD58ce30079cdbd685bf1dfe6d1503a89be
SHA162e2881c4f4a05479e9b3a0c16c8874f8a3dc96e
SHA25627cce97985006e8ef583c24b610805579aa5195414dd1360a50cfb6edd7f3107
SHA51227c8076190e5c1cd6f8f05fdf2177adb2aeed71734bf62e21339a445969afb58adfef38773ef5ef3a8dd39e01b89883de580f007d6f5522be989b588955048ca
-
Filesize
5KB
MD50ffaf0f75580f4ec30878ac877d9246f
SHA19f9f538792fedcde465edbbea9634e1c9dcbba51
SHA2569a39fe9599ca80537111696dfdab6b6210185e4162ff869344af1ef58dd15587
SHA512d375f7afdce3487dd534cfc4855c450eb000513975c6117fe5614906c4d26d9ed9235df9122501766e85f2d7fcc2b570afd0a6c1de5d1984cf45a1483fe87a19
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58b145fe14a6167e4f227e17eeb2042a8
SHA12872253c2ffc947a54246d8a8d88ad75e067479b
SHA2569c161d84478fd40830b95d4cbb71496b9359aed607d787fd8965a74bcb00ca1b
SHA5126aa2ac05b66deb0f6be9b88011d09090132aa96546ddccd2376fb9fbf04e7efd4e827ec80619ae7b263e24ffcdc2b3201aafcfb02f6141ade00c51dcdccc47cf
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e