Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2023 22:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://2023-refund-letter.info/
Resource
win10v2004-20231020-en
Behavioral task
behavioral2
Sample
https://2023-refund-letter.info/
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral3
Sample
https://2023-refund-letter.info/
Resource
android-x64-20231023.1-en
Behavioral task
behavioral4
Sample
https://2023-refund-letter.info/
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral5
Sample
https://2023-refund-letter.info/
Resource
macos-20220504-en
General
-
Target
https://2023-refund-letter.info/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2040 msedge.exe 2040 msedge.exe 1248 identity_helper.exe 1248 identity_helper.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1236 2040 msedge.exe 27 PID 2040 wrote to memory of 1236 2040 msedge.exe 27 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 1200 2040 msedge.exe 84 PID 2040 wrote to memory of 2072 2040 msedge.exe 85 PID 2040 wrote to memory of 2072 2040 msedge.exe 85 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86 PID 2040 wrote to memory of 3312 2040 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://2023-refund-letter.info/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff719146f8,0x7fff71914708,0x7fff719147182⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,18206933860716450610,17865260574999814509,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5e14c1e7498095a5a2e22e70cabc4590e
SHA197a5a716b8a842eedcdefa15b94f384888facc84
SHA2569dda9504eb0d3ba61f4d31cbf7a308fdf300cb81603eaad506993a2c5e8d003e
SHA5128aa9f36cd4ce6e87bc6ec8b3e18b54a98c2cd659f61d5579969dcc7f99b483a9f7f5fbf07c5afb4833120f8fae1ce1aa807ab2139e5d04bb5c263b3983ed4b65
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5518aec049c047f69fc270e3f5a83ac41
SHA1225c9d0e2aa21ab0e1f2fb260ad747657eba8609
SHA256cc059edfe7b4ab0539f1d46917f284b9ceb12d93af9f710f8ad7d24debcd6e99
SHA512738f677eb45fef812537e6fe926c69a6a977414e2f5e5022c7075e41a9c5ee7eb6301998b0ee08e7688b690fb31979e0d729c46a046abf1d7b81820e084e089f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
938B
MD50ba5c18f2278747c4126ac01c42cf4ba
SHA1347d522d05fd7a9802efcf6e78bd2f372ecfd0a9
SHA2560601101b6ace77a78915136b7208168a66db55a8ff01d1bc92ccc86baa1f573f
SHA5126776effc73dd211ccfa32d49aef5f9571f24122de56103deaee6a558f88e98556087f3cd1302633bdd7d2d88268baaad1b833bfd0f2c165d62c947145f709d54
-
Filesize
876B
MD5a47e64625a594b26e75af9eb520ab062
SHA13c6c178a13db693902eda5a0c19f547059e23a9c
SHA2562a7d839c46870de8b0dc53c5fa54db3803cf7277bd4d4e66b1dc9303b5326b05
SHA512fa7fd54f5f9e38cce6f4ec19ca32643e79f2d2eeb7c43d4cc2bcf28d749d2b723b185a5b982cdb2205bbd39c27667090074950b3e29977a79a3cd1f28bc6ffda
-
Filesize
5KB
MD541c5bb265beacdd5e158dcabfd935e97
SHA1543ce2b21a68ee509c512a3f2516770c71c357a1
SHA25668121813148f877b7b234bf8b116c350649ad31d0a0c26794ef190a449a6e083
SHA512988979bce50f4a516868c5372e212f20295274cd4f104eb7d32acc37f8127754b0c51265dd9237bf39f4ebe097abe5955d2461f7118e2bc4e2d2a0ae2132d155
-
Filesize
5KB
MD5e0813925ad86b690899d1696a23cbcf1
SHA18c8a7634ef64361df431f8de5d6ab9547041911d
SHA256c87105bc5468fcc0fa179f640069d1b9794283098571e598fd3e53897437933d
SHA512a0c4a193da4f05c71728e4b7b190edb9d878d2ad35bbe3515599ec60e893207ea1856d1cb0ae0d5a1f2248cad9f33b6175d075833cab27fbd2617a807110dad0
-
Filesize
5KB
MD517e4d38404c617b7dc1077d3c689175e
SHA110b4ac87272ff009f8222074d6663444bfaad7ab
SHA256d7c2cd0c1986f57f932c279b34d1e028e793c5669a9233b31a6949063a414a3c
SHA512ed05ee0043ff549d661aa3dce3d35dece00403bb19caf23e08c528150041f8fd03eb6742a493c0befb787ae28f3b3911d71da058a2b1670f776d70a31a87de86
-
Filesize
5KB
MD56d192fdfda18cc553c948111e724d26a
SHA1eb156e0775c4b2979f51028c3c83bf16ef05ea76
SHA25622258c9b834f338e30020289be467eae0810a52b6997eb61aba6c12f79ee354b
SHA512317a13618fd74ffa4b009c3393ad578bdcf3fa774e54198c99c68e7f6fa0784b5caa4cea7400af9b3f6ddb60c9acee69acf98667c3c2594319cfc2bbf4c83499
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c8f3187eaa570fe44777c2e89857096e
SHA1593ff2379a8022e9a8c7c4d4f1b7b040cfe5d749
SHA256ef652b05ce79805354fc7b1e63077f767d77463aa455ac6d425d7740970d0a21
SHA51234c87b6711e7f610208ccb96339fe65fbf56b0c5bd2559ca675c2c5ac3ae01278d9319dcf6a1598055b60bb5f14af534909b365953c71a3793adcc602ad3719c