Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2023 11:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://emailmarketing.locaweb.com.br/accounts/188358/messages/4/clicks/30775/3?envelope_id=3
Resource
win10v2004-20230915-en
General
-
Target
https://emailmarketing.locaweb.com.br/accounts/188358/messages/4/clicks/30775/3?envelope_id=3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 84434.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 4464 msedge.exe 4464 msedge.exe 4088 identity_helper.exe 4088 identity_helper.exe 4184 msedge.exe 4184 msedge.exe 4184 msedge.exe 4184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4432 4464 msedge.exe 30 PID 4464 wrote to memory of 4432 4464 msedge.exe 30 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3400 4464 msedge.exe 84 PID 4464 wrote to memory of 3500 4464 msedge.exe 83 PID 4464 wrote to memory of 3500 4464 msedge.exe 83 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85 PID 4464 wrote to memory of 752 4464 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://emailmarketing.locaweb.com.br/accounts/188358/messages/4/clicks/30775/3?envelope_id=31⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa86fa46f8,0x7ffa86fa4708,0x7ffa86fa47182⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4624 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,7381444351238019096,8874810483356558969,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4624 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD54c95d04dd5307cac08267f869e6115a4
SHA16ca13ba814672e512cfbd3ae9c73b34312ab994d
SHA256086704dc26087ac78e4ddc9c6072991c88f40f9a326778647a180bd3fc4ccdef
SHA5123a30bb4b2ccad9088edba7f149962a1904b60df20ae2e572f4a67ecb311d95dbaf2476acb4f63d7d8b5d17efc34403e713d3ce1a29e682116a340ee375314412
-
Filesize
5KB
MD594ca7e312ead9c1c183d20763202bf41
SHA17e178a540df832043012553eb8cb92153883e1a7
SHA25626477cee1710077c725efb5875d99772630bc0eafd0611957a4619031eedc216
SHA512d19e243eba3c8dc5e7d2e1d4445d1bc86e48f7c2cf9620136d96afadec02d24f7dc0beb77787099ab5b448005eebb39849320d8ffc3dcb1facfdb7f24283ff5b
-
Filesize
5KB
MD58f0b330b0bfa52dda8556940158b1cc6
SHA1c32312701dc95a09c5cf218a1179cdf7bbafa98a
SHA256ab2b696ab6ed1e5ed9984afdc586f65552bbb7d0a1ce4c569ea7a4273577028f
SHA512175e7e4b73958b721c4bee44539c4612d1e93db00cde93c571b3f5b621923a4eb46163dc1019818b0b042f4b1aabd873f7f8fae6579b59fdc4e39c39b91335bb
-
Filesize
24KB
MD5d555d038867542dfb2fb0575a0d3174e
SHA11a5868d6df0b5de26cf3fc7310b628ce0a3726f0
SHA256044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e
SHA512d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bdffe8b575b5ca3827779956824e6649
SHA1c4359afd6174211d83024891a57cabc1e543253c
SHA256cea715771572d88571629ece75bcc9a1bdd07f5a576cf6eab7149faa69746277
SHA5124e075c1adaaecadafc20f09f8b8575b2dbf27ddcb922b5d64fc9146b3c4c3bb17fbd30d5ea96bff374a510380ab726a4d8c43e66bb4f0fe8a9c2e8fc7bf65cb3
-
Filesize
473KB
MD5ae582eeeac4a35c0de91e0ebd0fcf22c
SHA11017cb48c7054a2e14db40a069e6a88e72911cc2
SHA2561cb954f9ed2b22510dd6868470d60f8b39de69a8b3ba93cc7ccb01d0ad0e89bc
SHA512e0b6e9255dcfec55a5c9e37f3bc9a211305a85115221b03f7bc4adb6d2013b69369e0e3658762480cc2fc12ee104af1ef866889141e519272026193cd3b66f4a