Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2023, 13:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://courierservicesin1.wixsite.com/courieren-US
Resource
win10v2004-20230831-en
General
-
Target
https://courierservicesin1.wixsite.com/courieren-US
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4604 msedge.exe 4604 msedge.exe 1652 identity_helper.exe 1652 identity_helper.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 2920 4604 msedge.exe 29 PID 4604 wrote to memory of 2920 4604 msedge.exe 29 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 3940 4604 msedge.exe 85 PID 4604 wrote to memory of 4684 4604 msedge.exe 87 PID 4604 wrote to memory of 4684 4604 msedge.exe 87 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86 PID 4604 wrote to memory of 2492 4604 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://courierservicesin1.wixsite.com/courieren-US1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc52b646f8,0x7ffc52b64708,0x7ffc52b647182⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11363277101757086947,8623215697547392635,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d686809520430031d6ecf2c8de5f735
SHA164e3932e857e1b34077e1b7793f40ad35abaf6b8
SHA256c5f61a0a6d91e818e9ada3e527de4a5975767d6425823b33ea107cec0c99874b
SHA5128a5adfc8d90f0752672879cf18f55be8e80e36e2a7bdf281ee3967f9953413dc31c33a0b52ada169c3f628896a28caba1769d8d33874903260ad6c8d5a925e36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD57a0dc98b6ee1d9b45de0af78fffe371e
SHA19bc77b40224d8071202be8d4d636ecb62956c7cd
SHA256857394af5f5accc4fd3ff6a0c0b29a7564349e6a9cddba03912428453f7e90fe
SHA512fe180338e607fa8a332230d8002eef919ad05dc41fcd7bf2fbf527d69514f1fe32e2624138ed7c6551a8a724c152414a60876ccd028d363d2c8ba564bf2f7aa8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
830B
MD5f2c7561fd04fc83c42207271ec646826
SHA1caec195b256ff2718c3c44fe08a4159ec63329b7
SHA256dee45ddc426fd6e5b6f90901565e3f71a2f02426f89a93bbfc16543ac633a6c5
SHA51279da63918859aea89e6dbb4e93713eac48e429a59650d0b8e985d9bc455b8d0d46097e0ef374ea3dc22dba7aff40d6e8aa6000432268110ddc2acd11c4aeda73
-
Filesize
5KB
MD54cd4a8f459ac3459ae60a19cdbad1857
SHA11d3e37a925992d53ba978c31549890498493921d
SHA256040a09f138eef51f3ba3cc1c24586b1511cb138bb50c9d86ca3b0e8b1af04392
SHA512c1e320846717b83bfcfd3f80fc3f09e6099282b6372bea8abc1071ba907e4d3a03683e349dcd281083fe7711a4ab34dd3bcec4298946999790f11fb22e54e024
-
Filesize
5KB
MD5a882fe5804aa320fafa9ded63d7a1d6b
SHA18aada2213a0613d074d7be07e24a0ae990678f9e
SHA256a4ab2dd053750fe5318680fef13db004c2b971b346be3ef5a613b64f06de4840
SHA512eec52172e703e20779f519107221953321f9b4aa61bc79f4ff694d46ae49d2052bb1e2347803e2a36fab2b3b803f26c5a633a8da58c52d1a12ee5aebe9ccf0d7
-
Filesize
24KB
MD50ea195b890a87594deb9c6aa963c1426
SHA14065f3fe0b70940a968f2ca342bac336be048082
SHA256c51961b927f80537702a7ff5f77501c1e088cbfcc22199675400ea88876f4ef9
SHA51259ae3e1e530b5c081089ee615fb5d227a1964068bcda421de1319e958438353bbed8ca275897deb097a564a6a60400e1faf6c3e1aa5764d1fbba15bdc1d9ddf5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de446e72c4f5af43715e93e01b4d48f7
SHA17b5c6e18e934e49219f57097acee94778c67fa3c
SHA256280589c957d9a6c61aac36ae9edb30c0cd092cb2a323f89acf23920fa0074d45
SHA512371016571618e85513c8f144182b6a40a85474f29890469c23a8cc9165f5ca875659aee7e6eea11c2a5f3a70d325b320cdd6b0f2eb6df4ed4baa338cba6f941e