Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 15:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://temu.com/u/sugY3OUOA5mWiZs5
Resource
win10v2004-20230915-en
General
-
Target
https://temu.com/u/sugY3OUOA5mWiZs5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 3604 msedge.exe 3604 msedge.exe 4768 identity_helper.exe 4768 identity_helper.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 2432 4196 msedge.exe 33 PID 4196 wrote to memory of 2432 4196 msedge.exe 33 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 1664 4196 msedge.exe 83 PID 4196 wrote to memory of 3604 4196 msedge.exe 84 PID 4196 wrote to memory of 3604 4196 msedge.exe 84 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86 PID 4196 wrote to memory of 1768 4196 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://temu.com/u/sugY3OUOA5mWiZs51⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa062446f8,0x7ffa06244708,0x7ffa062447182⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4663213842291092739,4423731258422254337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD59c7ec937596406c02cc352b9ed4c2e25
SHA1eb95e50f08190b494279a26b1b3fbf38cd8432f8
SHA256a6b5f7ea68f0e95479223eea7381bb00e6836ea44a86445693530896ba1ba1cf
SHA512725b312d0e49b12aa59742fd19278c016821561a3bb5c19b608f96f9c728c085c2b99204fa6c7abb730c660e9216ec9ee79048a633168d6876e411898cd03138
-
Filesize
152B
MD54d25fc6e43a16159ebfd161f28e16ef7
SHA149941a4bc3ed1ef90c7bcf1a8f0731c6a68facb4
SHA256cee74fad9d775323a5843d9e55c770314e8b58ec08653c7b2ce8e8049df42bb5
SHA512ea598fb8bfe15c777daeb025da98674fe8652f7341e5d150d188c46744fce11c4d20d1686d185039c5025c9a4252d1585686b1c3a4df4252e69675aaf37edfc1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5714e5c1fdeb5b9259906a444314f0939
SHA10b452be01638685f5afb1857325817902f1d47a1
SHA2560439ccadf626142c6a41ceae34a896652c18170d8b84e53fc1cf03a39385d755
SHA5122d0cf4901092f32bdcef7d893aeb7e8ad58813b9e704c53aa764fd728537c260030ce24475c8bec54c800fb393cb5d7aaf9959caba55494d0311a798f3bb420a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
613B
MD57bae5b217087df1d8e02d8b84eba73d0
SHA1208a48f0d9c4e261d4626cc6ce6937bc742f9e3c
SHA256eceef5b89c588f1993eeafff7b5a67194ce432269ec2455c3bf9f79acaa037a6
SHA512e981da127230b6dd3a85555b82e02404e4991f08e2440620e092cd841c440a17db536750665d428ae8ca4780b3b710326bb635ec0af9ffb20c57dad77b346c33
-
Filesize
5KB
MD546d886174c9ace753e09282b4fb2732a
SHA1c35d122b15baedc651eb7c24291f317bc14f1f1d
SHA2568003c512d7ea4cc2c7facb7dde858f4fc4050aae040b696b2b25fc6ede8dbaf6
SHA512839623ec4e4c3ad69df87631bd436935088cb190a57a4c6063d72152d0ee76b0b8bcfd14349dbf7a54cd2fb961a69676768448ef8ed8ab0bed7585506888367f
-
Filesize
5KB
MD58ea78799a7cc4d7ecb962010b7483685
SHA1552b213c8b8ecfc086cf06b5f3748f356704ab8a
SHA256bf1f6cf262cad342c2627674dadcd42d691214cb46661c95b7cd940da8d2ce1c
SHA5121efd2945103517231031cccf2fee2d9cfda1970f7b995b5e69735c91046a5df95cdac33dd991f63313d398c0e03fdd5a9e81c16cb67d1883617ab7ebf8e67e2f
-
Filesize
24KB
MD5d555d038867542dfb2fb0575a0d3174e
SHA11a5868d6df0b5de26cf3fc7310b628ce0a3726f0
SHA256044cac379dddf0c21b8e7ee4079d21c67e28795d14e678dbf3e35900f25a1e2e
SHA512d8220966fe6c3ae4499bc95ab3aead087a3dd915853320648849d2fc123a4acd157b7dba64af0108802522575a822651ecc005523c731423d9131ee679c2712f
-
Filesize
538B
MD52ab6342a933ed9e7294e5b0f2c33762c
SHA1e605576640d382d06d413dec515b461454799eb5
SHA256fa3d62dc7305d85d47e932c0484a5ab766c0542ccb6e93c2f2aecab7a0691991
SHA51237b04faea16ee9aa7924d2a83cecabda93c610f3aa19fa81e17fcc3502911e1f0cc471b2933d92d929dcc2c1d5843e32e7666abde83f9ac1f412f10b1da5844b
-
Filesize
538B
MD5bf6d44710e8faee218d7950c34557023
SHA10b1f0c4377b6ee5c46abe83d032f051f7d908517
SHA256037a9601cac65c85f289ab4bf50c2fb6682b6ee032d242bbccc3b806d1d868ed
SHA5128a4e2c3aaf1486a8afddda794204391f502b1a561b8a7e1e696ac075a40999d5301131695760b882774f5e1b41d021e2684fa1be0be36096f65d572bc57558b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389