Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 14:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.tggroup.io/
Resource
win10v2004-20231222-en
General
-
Target
https://www.tggroup.io/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 808 msedge.exe 808 msedge.exe 3868 msedge.exe 3868 msedge.exe 3908 identity_helper.exe 3908 identity_helper.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3868 wrote to memory of 3896 3868 msedge.exe 84 PID 3868 wrote to memory of 3896 3868 msedge.exe 84 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 4860 3868 msedge.exe 86 PID 3868 wrote to memory of 808 3868 msedge.exe 85 PID 3868 wrote to memory of 808 3868 msedge.exe 85 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87 PID 3868 wrote to memory of 2964 3868 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.tggroup.io/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff96c46f8,0x7ffff96c4708,0x7ffff96c47182⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,664806303582065094,12121044651480460083,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD549ce4c49a37ccf84fe06f4ebfcc04f4a
SHA167f6c3d4cc7e931058f96343c91b038b17e4cf70
SHA256001157c45952fe17e681a57cb54dd6cf78be4a918050783e9f855effbf8d7953
SHA5126dbb464950d562bf14601f421ff749ce2723b97cf20fffc959f108111fef676e6206cef37118ebd2616019308896ee75c888388058733b84a2022fd6f2f31286
-
Filesize
998B
MD50d043da8e843e4db0e1dbf33cd5eb09c
SHA1b30dc78b46d0f5cbfdc7b6530ff7ab85877925f1
SHA256901c32dfa5c97cec315989fd8dd6fd3562b67c0f785a3626502a874fd3b20b48
SHA5129b27c08e8a0935b2eaa606865149c47bef48d66680a06222dd08e1cbaae72b78cbb618dffbc5fcf44b852c31974f7687e605eb02dc56d805ed74b4671373bd3d
-
Filesize
5KB
MD557b82774b7f4e2016e0be30b5f28327f
SHA1506b4bed3cfa2bbb0ce0b62f1aab92d30848a21a
SHA256dba31c0c8e278b00dea4e64d54af6f7202cd62f07f339b34e1cb2e3ef7cfdac6
SHA51220c84bb9b3aa309691145319bf57646ed5bd0e6e7ecc73584d4bc8c8792663f77be048268fc16d2bb339de8a3dd909cdfd02eb0255bbb85f43d0e5b24c2ce0a2
-
Filesize
5KB
MD550420403d4150337bb4697602f65958b
SHA160b8932e5547a2fcbf94761d20c417bacc611bdc
SHA256754fe922e8b1b47c7854a659c6db5131dd8bb3331485dedd88c425af134582a5
SHA5128ff2187e147ba03f9b41301e2a5527f3dc4bce30d6c4f9f0ba51d91b3c1a327f55cb92593eb979eeca7ede507faaa04b68e193fbe6452d1d99488dd89e41c7de
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD572ba24845576d84eb3d36351698b51c4
SHA1f21b1416003e52f1bf398cae1324fc8e5647b4fd
SHA256ffe6c1c3c536b87c63f88d168fbbcb39872741e7bb25ae8801d74a19b54a8e6f
SHA512c749d1319061d9aec8403118965993c6c873489bc23de5024aa0b4810fd4844a72ea4b6e824cdf1976ebf372325d859898f7f63ae346c8665313fede8809dcbf