Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 07:24
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://401play.us17.list-manage.com/track/click?u=fe8bcfcf4b4364eedb975549b&id=7ed6ef05b7&e=f78a2e23cd
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://401play.us17.list-manage.com/track/click?u=fe8bcfcf4b4364eedb975549b&id=7ed6ef05b7&e=f78a2e23cd
Resource
win10v2004-20231222-en
General
-
Target
https://401play.us17.list-manage.com/track/click?u=fe8bcfcf4b4364eedb975549b&id=7ed6ef05b7&e=f78a2e23cd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 2136 msedge.exe 2136 msedge.exe 4416 identity_helper.exe 4416 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 3460 2136 msedge.exe 84 PID 2136 wrote to memory of 3460 2136 msedge.exe 84 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 2832 2136 msedge.exe 87 PID 2136 wrote to memory of 4136 2136 msedge.exe 85 PID 2136 wrote to memory of 4136 2136 msedge.exe 85 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86 PID 2136 wrote to memory of 1208 2136 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://401play.us17.list-manage.com/track/click?u=fe8bcfcf4b4364eedb975549b&id=7ed6ef05b7&e=f78a2e23cd1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d9c746f8,0x7ff8d9c74708,0x7ff8d9c747182⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=3504 /prefetch:62⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12324417160874577271,10330563425643829861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
483B
MD5acdcde05689aa9190dec23bd7780d38d
SHA14089ad5fd830ad011d13a33a946d4963446e4f21
SHA256d7e93c33142e3b895e7bad4706fbf7de30869ed828ef6491ea5749557db149cb
SHA5125b1ed27ed94ffd3b47c326d40cf5e5f49a86b4ba1e0772364f83df077f750c2b5cf2aa279b6ee54cc3f7290fc3f8846eb0911d3507ecfaf8f1bfedd982a285e5
-
Filesize
6KB
MD54e6d2b61225c05e448bc96fa95465026
SHA17f7f24d0d69416f31b3503f706fc228291162a7b
SHA25621312f0cf4d917957eee71821f421d00c3e8cd9746159f76f67b0b1379993829
SHA512ede776eb8690266f0592c58b4ca2799bbd8cb636d8854f02ce0852baf175e1cf7cf4ee280840b9fa0392f166ed5ebaae20af94c957b6453c0c0b2d4cfeaf8f40
-
Filesize
5KB
MD5bfcc0776969cbe2221296c12b6ede85b
SHA11220edbbe5c6359312ec72920ec47342aefa55f4
SHA256a8d899fcfa18123d37b28fbf94ffa896a1edfacac9ca2cc8bdf84dd2bda327ad
SHA512f62ae1e21e71af3001beb0fecf92ef0f4d938179a141930d7de60e9b5254034bca64e9c453fdc607add87272f78136ad3834edd89ad5981f163c57abcef16067
-
Filesize
24KB
MD5da501e07c2e4f0c56da44d46d614a406
SHA19624e765801de7e06f8df24ef37a54ac21297c65
SHA256801e3e8abcaa2e4101192ab3f30c4fd1cc9a3c688df4e1cc33234d975a17aac0
SHA512db90caa2a15943bbc197446fed2598dfe230ca0d5e0f0a40501a4b8bc02be3027dc5a53a4b72cd2926e68372b68dd26dd5cdfe741f0de1efce1ea70adc7df1ae
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55dfeb955cab92384c50c49a05f3cf0e0
SHA132529d9d4a3eed251a00ddde1801952108a02dde
SHA256df6d8b9a2226ae99cb52bd7f34b4bef0c1fe74ab5d532e46631d15073e679d3b
SHA51274f6ad19c6f17049f63190fb9bce449b1d9c7d4979dd30cd2a086cf19f05d556be15474149a8db5bb66614f9ef083b80a573c22f2bb4f64c2928beaa494cfcb2