Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2023, 23:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hymsznu-zgpvh.maillist-manage.net/click/1f81e8aa23f87069/1f81e8aa23ececf2
Resource
win10v2004-20230703-en
General
-
Target
https://hymsznu-zgpvh.maillist-manage.net/click/1f81e8aa23f87069/1f81e8aa23ececf2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 1012 msedge.exe 1012 msedge.exe 2748 identity_helper.exe 2748 identity_helper.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe 1012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1012 wrote to memory of 1288 1012 msedge.exe 87 PID 1012 wrote to memory of 1288 1012 msedge.exe 87 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 4612 1012 msedge.exe 88 PID 1012 wrote to memory of 5116 1012 msedge.exe 89 PID 1012 wrote to memory of 5116 1012 msedge.exe 89 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90 PID 1012 wrote to memory of 3972 1012 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://hymsznu-zgpvh.maillist-manage.net/click/1f81e8aa23f87069/1f81e8aa23ececf21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc07546f8,0x7ffdc0754708,0x7ffdc07547182⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,12552828273836193973,16593757873163321834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fc99b0086d7714fd471ed4acc862ccc0
SHA139a3c43c97f778d67413a023d66e8e930d0e2314
SHA25645ef01f81605bfd96126d5520c5aa0304c7fa7d5fdb3e4d5b2dd2bf84e2afd96
SHA512c308fa3eda9235d67a506a5f058fefb9a769ec01d7b0d4f5a2397892cc4f8155301c55c1fac23bebacdd087ab3f47f1eacc9ff88eff4115a7d67aa7b1d6581a8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD574c58ad1da2e1e13db24142bd2621fab
SHA11b555a732ee2a08a7cececb25448946734946713
SHA25636e9faa689d443b091fed14e6b896473969c701921f91781516676acd40d76e0
SHA512fdccfea70ca7f79ebe298aaad58ec757e3fe5773316440189c1d6e09dc08a70733a1fbbf8f04b1bdd5d074e009aa8b86507b14ea6997060040503a2d1c325d75
-
Filesize
5KB
MD53a206f09d46911beae37f13d42cbb962
SHA17734666e663ba9fcaa40132e828f6e72dcbae974
SHA2564b6818b3f38681ff5ee31b7d2ea155f0a5ed3cd431d5dd93afb0ae53e8c0f9a0
SHA512e2a606c9881973cb55692e775b79fc2012c37a8190f36658c43fec90bf43ed4792c8069fd1ca7acdc3737eb17f83f084154577c7ed797bddb19513aba30825d4
-
Filesize
5KB
MD51f92b58e8b09c789b14c5aa77052d2a3
SHA1e78d1eaee5d7fc7d7d21db3a21ba5247dc0644bc
SHA25630310bbbe9011b4d6629b51ba29ebea879e8e6ea4a9d94d2dddbf7a3ff8596dc
SHA512e95ed27811e7d40b52d6cb5c7e7960dbd123ffbcaaad536fe6839e4d7ba0e91c36bd07534457a659b780b2fcbcf8f8027560ad5e51bb02cc2ec73d0e22f73055
-
Filesize
24KB
MD596f00bbd6a174879c58220f95f0115f5
SHA1d3d7f82b0bf27daf1b3903bfe050c2d05422050f
SHA256644442e740a8c0bb20f712f6f84f5bf4a81bb29d4e9446b2832ca65618961107
SHA512e7c5e90eb85aee7b81b9c163f618ad3789a48b256040f6f00eee7fce52c60e1ff491bf0538b9c846fb115b73163710e46a45ce056e3b41ca59d88c421502ccea
-
Filesize
540B
MD57c97b045d8a8370ac970369a8a3b8327
SHA114c5515f59462127b2e7c9c4c25d0cd49b65120c
SHA2560f176955de2e8c6fcfbf11dfdccd791b5d9bf1100e819ff11cfec55d87ea7697
SHA5128d468ed4cfb41bfbbe63d1787cef8d0dc89e357ff3f978d7455f3b1fffeb8536a6f79832c891c24f4ce4b84a777aea44ec14c0200ffd66c5d4729e4b756f3584
-
Filesize
204B
MD55d080a508e717b05f548090af6bb2052
SHA16a51d663fd4844ad290b3548b44455efdd7a9ecc
SHA2563f4dd34d4f785e611026222558215835018a244bb00c73a063d079bd4b96e96b
SHA512a9d92fbb5ba58dcba6e89a8914694d74687a69ec50fc1a359c7f7b1f6fd15cb63cf0784cbc084088f6a4756a9024b1b015b599cbef435f11de90e251286a15c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
13KB
MD5e92ffafb65ffc2f56940d2089ee05b07
SHA15c75ecf1e2ec1bd11fd09456140fa4559ccb1917
SHA256ab6c17596337941b92bcf497634519ea584ea264f57cc2857d781852344dc653
SHA512ce39c72827787d0cfc2a46a6279fd72f55fe7e2f00ed2d49ca5a539cfa0734f96c7580ed5ef0676f786c0f9da1a68a70c61f174e025d5c5bdd7ec1b9aae17492
-
Filesize
12KB
MD5cceac612a1be77e69b0218dfe1653dbb
SHA172e6b6012b3717e44f9216ee32181b38031375e5
SHA256d84d5ddcc321dfed81ff6a04d38118d9ce37849efc8f7986cad15ba630fa747b
SHA5128ba377ac583887c4af0753b348c25aae0d4e3b3c456ca303c0ef7a46cabef5e5df4b762d17a64c4eb268393100da535d6fd595ac8d23d6d5761bf1dbd9586c8d