Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2024 03:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1191249861484486656/1196256047942344765/tickle.exe?ex=65dbe143&is=65c96c43&hm=5c6456738b20c4d54275c25f107024279c6b20de661242679ecfc5221da055a1&
Resource
win10v2004-20231215-en
General
-
Target
https://cdn.discordapp.com/attachments/1191249861484486656/1196256047942344765/tickle.exe?ex=65dbe143&is=65c96c43&hm=5c6456738b20c4d54275c25f107024279c6b20de661242679ecfc5221da055a1&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1780 tickle.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 534967.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 4756 msedge.exe 4756 msedge.exe 1796 identity_helper.exe 1796 identity_helper.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4900 4756 msedge.exe 84 PID 4756 wrote to memory of 4900 4756 msedge.exe 84 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3424 4756 msedge.exe 85 PID 4756 wrote to memory of 3428 4756 msedge.exe 86 PID 4756 wrote to memory of 3428 4756 msedge.exe 86 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87 PID 4756 wrote to memory of 1812 4756 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1191249861484486656/1196256047942344765/tickle.exe?ex=65dbe143&is=65c96c43&hm=5c6456738b20c4d54275c25f107024279c6b20de661242679ecfc5221da055a1&1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a6ed46f8,0x7ff9a6ed4708,0x7ff9a6ed47182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6292 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2300 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2136,7020552310095056052,17892809029749724812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1844
-
C:\Users\Admin\Downloads\tickle.exe"C:\Users\Admin\Downloads\tickle.exe"1⤵
- Executes dropped EXE
PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5e29fd27-c32e-4ff6-8279-3d7eaa58e8cc.tmp
Filesize24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD51a249ffe05911ad56059b920895fd686
SHA101924fd4a4c4455b5037b593f61429a925816560
SHA25650718c3ebe1458330928851a0adb74cc1b7334e33d6eb83c9a2b60c863fd1d2e
SHA512959b9f00569d32e61945787ae2dda263950c2f3d8a9cd6804f7d2625315c3decc3e00f5e8d1e8bf17d1a2b14e2615d0be70f9db3d69bbd40cea6291a9b64c6b7
-
Filesize
5KB
MD56bdc8b9866fac00e92aa031c3cc5bb56
SHA1cc5ccfc4e74a40c144612345e1a33a81545307e5
SHA2568007363e12f045af5428e24546594c3a2f20df4bf6c572f10e364286a815e55b
SHA5121fcd1da04175c31d6a79a4c38561827417a7dd6ca4d4b17c1ab6521b933f7280b1a382445afbd3cae7c531ae997ba85df08455d72ec1ce610a811b2201061c63
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dbf25319f8047c93bb599d0b7bc264c2
SHA1f5287b54a84d59f600a00594abb9662054c1afae
SHA256dd8a3b6a9a01e05b73b90d336fae7d63a7e82280b14bc1d2acc0c3290cbafb59
SHA512e068de4bad1fbe38068652be01cf341c1cc7b1837a94e01ec1c8afc9dc8c0d403b7f77e334eb1b12b45e9e6f3d9f20aefea6b3153e5acfbd11a528189b47274f
-
Filesize
10KB
MD5263dea64988d1f4a4cc503daad9743ae
SHA16177adf9da5798453ed7a19a955a3bc953381b37
SHA2561c721d2e7cba43677f892cd5de72e95c51dcba97d4c04a5d178b255b2e674409
SHA5124628b0d576bd42c5f1aa4a270e86ff83e758052dac8013252ac86e4c1c4987c4313d19197cd6f9c644bd6f93922b11ff9459c131108c595152092557fd6df467
-
Filesize
41KB
MD5e0ebb032a81fe5279c08d6736fd62f03
SHA1e50362d854bcf5c2063a31c52a2159b8941e1e85
SHA256400c4eefcfbd3937a4e604f270402e497ea8eed4ef71959c8aa3bb1ce23abc3c
SHA512942781645560e1cb1dc0465bde7f6f51efaabc4ba08b08e27ff9f4de6b5f1c0c1aa8260f633c685948ab018ea2e1ef1d815e67f154008354efaf772358a1b42b