Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 08:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www2.serrala.com/client-newsletter-preferences.html
Resource
win10v2004-20231023-en
General
-
Target
https://www2.serrala.com/client-newsletter-preferences.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3780 msedge.exe 3780 msedge.exe 2528 identity_helper.exe 2528 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3780 wrote to memory of 2060 3780 msedge.exe 76 PID 3780 wrote to memory of 2060 3780 msedge.exe 76 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 5088 3780 msedge.exe 85 PID 3780 wrote to memory of 3184 3780 msedge.exe 86 PID 3780 wrote to memory of 3184 3780 msedge.exe 86 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87 PID 3780 wrote to memory of 1376 3780 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www2.serrala.com/client-newsletter-preferences.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff867e946f8,0x7ff867e94708,0x7ff867e947182⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11997876045527749065,12986314007945861701,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD54a690f5da091fdb8d797179bb884534c
SHA146e8dbf6014a33789aee394f8ffedd45845b664b
SHA256626927fd1fb5d6ed65bbbd82298a433339c475b060e416f0f2b234e934cb1b54
SHA5124bad455a5d6639a018154462f82f7787fd5721d7087c5a6ab28b5575e5d416fd5827806aa1fcee3a0f8a21a1d596a107946bcb86c3c56ca612488a13ea165293
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD597516d6f19c0183e28918dde81fd26ff
SHA1027bfb5ecc2778c8d4be915c2f6af94a96f4c9a8
SHA256f028c393afbef6290ed97c9b4673a994b2cc7d1f7ded92e79a670bfb673b434d
SHA512b1eda9d98f243e970101e4d558fbd65f094eef7b648a264aa37042b50bd9668453a38ba1e80ecbfb602367270ec68a431681f012af9ecfac3670f5378fdfb9fc
-
Filesize
5KB
MD5a37ce1440cde815fd7e71441cfc55cd2
SHA1e4835ace7076db43631f4019182242ede2f708cf
SHA25693f6eb78d4b1c1fee629dd7ff0e2b9f8073567295483bb96fdf7efc589b3009b
SHA5125ca47890a25024f96c718e0e71888b624ca9f38a57092d57dd79d7b5ec829883821a5aa70ffa89218494c397b2db0a16ba86893089614201fcf3bd70491255d8
-
Filesize
5KB
MD5e89ae2a0fe658960e3d273785545c178
SHA1367ddb785c62a110c1466569167a81ad2fca5bc5
SHA256314c197f16a099664569983939fac2e73d8d736eee41fd545a921935543b76bc
SHA5127e8ad5638cd9d4c4f5ca5353793175674d6f02a2d7d1ce59d74858c41a189188384895d686e5b5496113c3ca3288374d3957cdd62a1a424e4af7afd3183a1dab
-
Filesize
6KB
MD5f7e27584276ecd77d7a70802d4d2a7f9
SHA1edb89919fffac8a2845ac2ac92eced67d7a8d8c8
SHA256b784a1b33d5dc17b0f773217600d564482c89c0a7d748448356ce2387dc07f9c
SHA512e19736e406bfb26cf513f91dd71ccba7be5189b413e08d2863761a226a9b35f9be77e730aacc1306b6b44b26951ec26ef1b81a75e4cddb8c81971992f15f646c
-
Filesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5283097e824e98b01aba61b4ee60228cc
SHA19180bc6fa2cae5567b45181231e96d786e5cf768
SHA256bf6c8765e60ab2a7cd2add4d280c6b58adbce566f9ef633d2d0252c1b0bf783d
SHA51224c6a31992cf32095e3a51da1462c8ecfe3e8e0818b52e59a2a1f1baac82f1d3b2c003cf19922bfb2e44b43fdf130eb5d4e03c4481d1fd4c564636ff69821315