Analysis
-
max time kernel
207s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 14:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://emailseguro.org/index.php
Resource
win10v2004-20231215-en
General
-
Target
https://emailseguro.org/index.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 3236 msedge.exe 3236 msedge.exe 3852 identity_helper.exe 3852 identity_helper.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3236 wrote to memory of 4736 3236 msedge.exe 85 PID 3236 wrote to memory of 4736 3236 msedge.exe 85 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 4324 3236 msedge.exe 87 PID 3236 wrote to memory of 1840 3236 msedge.exe 86 PID 3236 wrote to memory of 1840 3236 msedge.exe 86 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88 PID 3236 wrote to memory of 4896 3236 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://emailseguro.org/index.php1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffb23a846f8,0x7ffb23a84708,0x7ffb23a847182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,12148797457836768491,15699516149115494828,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5ea92a11c6d449d995b0fe5c6c38f6aa4
SHA1b4ef48dabb98732ca10d8062cbc448d2906c60e8
SHA256e5591093d7a726f020e63a02a691252f01a9e7818ce812b4c0ba65737e1b86fd
SHA5125e1bfb8a96604a6c778f2ff238c7357393cb50be0c7819c5dbaf43662cfd68b60c1928019da9120164a0c7c8fdfaeff0bccffce6750dd771a1d4e998d339020c
-
Filesize
1KB
MD5bd7ffcc511a106b5a11bf585239ce1d6
SHA1e92313626f418c3686099b93411ec0f5d8c6ddf0
SHA256876e9239c754cbea9996f29bc0eea541097e166f447bd3e54ee0719a044abd47
SHA5120d1261ec7018821e3f8d3847d90a7b548eeff4df9830c5a794586bbf1f729a6b3264735fb222892c216c2a4cbdde44b71dcf747f96692cd4933b8e38bd7fcfb9
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5bc70c9154bfd33151037c0e775893245
SHA1d9bd649711273b06c08cb81f23aa4dea898c16a4
SHA2566ead8c79b91adcff9d7d455800e1b06b91bc2be8fe52b482c4e9e84b8afc1e86
SHA512547924c06a750f58e10107f742f6c131a648867386d297b7d1ea87b6b69f768a1ba2992b45ffa6c62bfc1162b6dc677db7af792c30e13fc22929cfb646151cbb
-
Filesize
5KB
MD5af4874ddf8f06a5fe8b57f7fe4cebc39
SHA18c0c356ca1e79431c1d670099f3dc94741d72977
SHA2561d31e939f43d5196b3884bf1b65d7ada3c36b3a385475948f72853404efe2b4d
SHA512637e9e195d5cf12817f5600024a60bb781d80120feb4523e245976f7bb5dfe4c21b12204df543066946207afa661a8c195be67ab8df03af44e4a50fdd9f0cb09
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56555660af52988378efc7ca97cd1579b
SHA1397b057e86d462149164a4cb96c24c92281a944e
SHA256d678d1c444721b2a1c7e4370d48b26a75b3d7c7dbe4d923a3c5118709a5d0ce3
SHA512f9a01ccd24bd5b110e97d0c8c53c488e21ec240d5607f9ea3293823a34b887acf98d83e643850918abaad8afc7d5f7148789b59e7d3adfe75bd60db3528d9d28