Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 22:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tfours.co.mz/index.html
Resource
win10v2004-20240221-en
General
-
Target
http://tfours.co.mz/index.html
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 59 ipinfo.io 61 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2680 msedge.exe 2680 msedge.exe 4108 identity_helper.exe 4108 identity_helper.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 3008 2680 msedge.exe 27 PID 2680 wrote to memory of 3008 2680 msedge.exe 27 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 5192 2680 msedge.exe 86 PID 2680 wrote to memory of 2644 2680 msedge.exe 85 PID 2680 wrote to memory of 2644 2680 msedge.exe 85 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87 PID 2680 wrote to memory of 3112 2680 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://tfours.co.mz/index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff884d046f8,0x7ff884d04708,0x7ff884d047182⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2528 /prefetch:12⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16991824869479338234,7362125581016205809,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e189354a800c436e6cec7c07e6c0feea
SHA15c84fbda33c9276736ff3cb01d30ff34b032f781
SHA256826adca1e688de79a3ec5b91c75990927fb2a33ae717f474608c68336053f427
SHA512ceb069a5e83a634503e253846fa17b8bf7aaa539c3353ce61251633d69068e24c5eadd1b496f43058790d2b513e65d2c0b0213730813d0b58bb82a00596e05e4
-
Filesize
152B
MD5b9e3e150cfe464e9ebf0a6db1aa5e7a2
SHA13cb184e2781c07ac000661bf82e3857a83601813
SHA2562325a6292907263d1fb089a09f22fbcc6bad56f4961d427efdef1abaef097bcc
SHA512f5eb1e76eb9441cf5000d8d4db9296077b61714ead5012779c084b37f4bba07614055738f5dce69b13b25975d9b7c03eab049b7685eee09b23fd8d4a7d71a039
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD509de97391cd79e5e17236d70ce34baab
SHA1f7774053de644fbb7e30128c8a5c0ca1059af4b4
SHA256cc529ddab4c23a74c5a211c4041c58db08fe607dc26487e4e0d797080690366e
SHA512d6069dd3735b0eb66e32fb11d0fa9a7153a9370bb494bfbb2075430ef85d002e43b94cb19843b88c215f20528c10976e8c761989af4d81e980d27b18a5965f8a
-
Filesize
2KB
MD5a34aecd77a8dcab3722c44c78e323388
SHA1494378f0765b90c14c0092afc5ebcc149b28d936
SHA25602fba41e68268c5d80758f120ac6c8ec8ba9bd6b8fb6efff7621a58cf0281364
SHA512298aa3142a56de36dd6189e195c7026d042ea6a8fdd1664cf80a11602d28f2e662bf3bc5f08f1e72f8807e58530e87163aafd53399cd0b99084f2c372a3e448a
-
Filesize
6KB
MD59bcc2d2040d571e7f8f81323a7d936ad
SHA1e8bf7480228df57e0260065adb28818327c44a74
SHA256ba66da28e3246a9efa3a5674b8a9c1e93655d24c06afdc974354f186be85a154
SHA512d98049e3766874a8be6c9ef0713562e931f8fd8081689e66eea9c9720e5e315c269990ac68a24659b53793a25cf74e40f90f6221438624b0b2a5904adb1c6ecc
-
Filesize
7KB
MD5f85ce8e9d8977e429887d274fb6490f5
SHA167b503628965ba9dff44171ce7ad7598637a9468
SHA2567fcd34248410fac5a6458963f55cd279e821e881046b05c7209cb697435ad556
SHA512ec5e951f71f3b9adae8ea97c296900b729e94efc18e07211f58d62703002a79b705cb889b9d2808276d182b546288597cd8f88ad7a36c3991ad259f47acc20d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD500453719d18473934e472a9ceef26f8f
SHA124fb8e7aa81b547c3a186e6e18cadb345e56e562
SHA256a62708ecba717f5fcddf625b8eda9376643ed0ae5ed25d7ab832a37db43bcc2a
SHA512e55554b01c1f7c6535c4bccfb83f2c575f0524338b14cff254a4bfc2700f2528eb24d0dc51246468246d573d51d90fa60e698cc0c2c7d04cb21dc4ef98ffeffb