Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2023, 03:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://info-email.emburse.com/trk?t=1&mid=NDk2LUNQRy03NjIAAAGOlbN9ipzVGcBrGFk_k49d09Lyya9dTgd7NVfyBOY6XHuE_ZkYSWV0Udn-btqSCOy1zLuAMWLXPc256Noq8E1OsyhfwLF8BtsoMF5DzGYGd7_QkzP3QWpJYXUUWN_gdW-Bb-AtC64C2fk8csWB9Q
Resource
win10v2004-20230915-en
General
-
Target
https://info-email.emburse.com/trk?t=1&mid=NDk2LUNQRy03NjIAAAGOlbN9ipzVGcBrGFk_k49d09Lyya9dTgd7NVfyBOY6XHuE_ZkYSWV0Udn-btqSCOy1zLuAMWLXPc256Noq8E1OsyhfwLF8BtsoMF5DzGYGd7_QkzP3QWpJYXUUWN_gdW-Bb-AtC64C2fk8csWB9Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 4904 msedge.exe 4904 msedge.exe 4484 identity_helper.exe 4484 identity_helper.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2852 4904 msedge.exe 83 PID 4904 wrote to memory of 2852 4904 msedge.exe 83 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 1128 4904 msedge.exe 86 PID 4904 wrote to memory of 2992 4904 msedge.exe 85 PID 4904 wrote to memory of 2992 4904 msedge.exe 85 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87 PID 4904 wrote to memory of 644 4904 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://info-email.emburse.com/trk?t=1&mid=NDk2LUNQRy03NjIAAAGOlbN9ipzVGcBrGFk_k49d09Lyya9dTgd7NVfyBOY6XHuE_ZkYSWV0Udn-btqSCOy1zLuAMWLXPc256Noq8E1OsyhfwLF8BtsoMF5DzGYGd7_QkzP3QWpJYXUUWN_gdW-Bb-AtC64C2fk8csWB9Q1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc72a46f8,0x7ffcc72a4708,0x7ffcc72a47182⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,599069936866334410,14189966461171668336,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bf009481892dd0d1c49db97428428ede
SHA1aee4e7e213f6332c1629a701b42335eb1a035c66
SHA25618236c88bc4fe576f82223cca595133aa3b4e5fd24ebac9fd515b70e6f403ab4
SHA512d05515ff319b0b82030bc9d4a27f0432b613488f945d1dae8b8dfe73c64e651eb39f4141a5d2e157e2afb43dd1dd95b6611c1003ac4e2e80511e6c5cd7cfdf11
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
190B
MD56114af4e211fdbf23e303812f1beb4b8
SHA13405b8ceae4c5865e8e5235f18ebf28519a6714d
SHA2560d89e3f382b1dc73060b8c5e42ec53a61bbab88d1da3861194ba7ff843edf083
SHA512422eaff3f558cbe61976409cef2ee0bd52c5703f949c2677472e60e91626db42f2e2635949e6747e0a137ebefc0170b7f2d6e3ffd9e8b1e5d315f6460228895d
-
Filesize
5KB
MD5072c01fadd49bf702c49d87d3bc39851
SHA1b0329271a2669d8eb377df2a4219860667a90831
SHA25680149bc42aa4aa58d7a86ea2d8eb265d7d3b415e2813640c479bc3e18701c9d2
SHA512e43689fe430a3fa91cc2d2cd3f691bffc68dda7c5afb8516fcf2fc5e23ff09a43d715444b699cbd1579815d73ae7e3d29207fb7cd6286ac5c48ce7da53abfdbf
-
Filesize
5KB
MD5fbcd412bc7cc090ba8270daf15db8e52
SHA1c25211b20729a905eeb5bbda3fb048fc4ab97f99
SHA256627ec531fa301b0a7b35f64a1370bc810b73a25052ce1bc34fba7c592bd4cbcc
SHA512ccb16e921e29daea0ddf1347cfec4c8c8dc8e0e0fa92863362e09da2ac54b3c71e1fc287bd8462c3ab15707cb448e3451057d00e2094a9627cc98f7d09f2c914
-
Filesize
5KB
MD5d5ca22c15c99e8aac9beb46aab545f84
SHA180f241fcc36cab1e80f3185b5fef90655f56c48f
SHA2566952ae2caf299fc8a2dcc233b8824e2e42a60d87ccda5cbece5a333a24287eea
SHA5127ecfaeac177f7afef53406d53ce96cad4c8efcbd90fbcd07dc8faa9a2e764aab7269de5c7139c01dffcdc835ca2f05a7bcb451bf75a84c54ae2a8117e7518a9e
-
Filesize
24KB
MD525ac77f8c7c7b76b93c8346e41b89a95
SHA15a8f769162bab0a75b1014fb8b94f9bb1fb7970a
SHA2568ad26364375358eac8238a730ef826749677c62d709003d84e758f0e7478cc4b
SHA512df64a3593882972f3b10c997b118087c97a7fa684cd722624d7f5fb41d645c605d59a89eccf7518570ff9e73b4310432c4bb5864ee58e78c0743c0c1606853a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b03620e00786ba0ce04ccf26d8b1faac
SHA1eadabee371fecd1c14d9b97532cd6503f81c41ed
SHA256831d326d0272ea6767f8b5a1d7b40fa176f2472090ce7b26aeda50ba4ff78042
SHA51255873d9ca47b282621f67607a5cd589e179a619b16fb27258553a71413522e4f93243c30ea85ccdd958ad3d302fe13b6b91f49dcc54151c9ae254cb7fcf291c9
-
Filesize
10KB
MD5fe76b916d6526c5e6e2374ea22410842
SHA137439e440bfd647d3dcd8a5bb6485296a03f5fd1
SHA256a85f8cc67987570e99a77c396e6a805e9bd1b2196033af9bcbda975d8b32c048
SHA512a24c7179f36e8af1c56c86322165e93223a11fb9272013220fb58c951d4b4e89911fd5d7dc9ad659f6f0076795db11bbae0689ed6b8007a4113fe4d02cf8b576