Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 20:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mail.google.com/mail/u/0?ui=2&ik=42c9041d0c&attid=0.1&permmsgid=msg-f:1790958075913040465&th=18dac2e19269f251&view=att&disp=inline&realattid=cf09509275c19ba6_0.1
Resource
win10v2004-20240226-en
General
-
Target
https://mail.google.com/mail/u/0?ui=2&ik=42c9041d0c&attid=0.1&permmsgid=msg-f:1790958075913040465&th=18dac2e19269f251&view=att&disp=inline&realattid=cf09509275c19ba6_0.1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 2352 msedge.exe 2352 msedge.exe 4904 identity_helper.exe 4904 identity_helper.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 4924 2352 msedge.exe 62 PID 2352 wrote to memory of 4924 2352 msedge.exe 62 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 5092 2352 msedge.exe 90 PID 2352 wrote to memory of 4856 2352 msedge.exe 89 PID 2352 wrote to memory of 4856 2352 msedge.exe 89 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91 PID 2352 wrote to memory of 4592 2352 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mail.google.com/mail/u/0?ui=2&ik=42c9041d0c&attid=0.1&permmsgid=msg-f:1790958075913040465&th=18dac2e19269f251&view=att&disp=inline&realattid=cf09509275c19ba6_0.11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff9b246f8,0x7ffff9b24708,0x7ffff9b247182⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,3934570021189606415,11808687799821161703,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5458c3d48f9bfb8e571da545eb5cdce8c
SHA1548b0faee0e7e2c0d54dd38e743ae5923e4dade7
SHA2568eb32feaca6cd890076a7dba162823815df77217558b4eebc80323f8680728b2
SHA51205798f5175539353de0528af4624612a51360af706c703fe898cf9ac777efda074b6744e247b005d60bc7312e33017a2f60697f486cebb3257307050b5726f0b
-
Filesize
1KB
MD53ab76c9a409cfc2594ebaaeb6520db07
SHA191fda7db42c29fe5757e2022a851704f05c69ffb
SHA256cd7db186d3c91639f440637febe15786a47f356007902e07cd92df1a10dedd25
SHA5121664fa112f0dc94505612dc295518958f0249c686d0a581ef6389c93d23499a42583d02316abeac5336094813d9131aa6898a6df7d928a3d593850f29275f6a2
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD526662f4e732d8e917eec29ceb88ce2de
SHA1954bfa7e39ad22f2f32f6f54e4e566677345b2a1
SHA256dd10765e074ffd49926222d20e1fb28b5e2a34ebc259b823f24d174df705f9dd
SHA5122de367aa760f1b764931c2db1abed7eb13a393c56b2d16e013e46cf2c8f4bf730925f631bb751a8fa5f7b17e77eaeb6820370ccb762bffe06d0c0991f245d63e
-
Filesize
6KB
MD58245791a4324b4e008f793ef508fd6f6
SHA1ddbb67c3812d56a9cdd303b1893363b03533132c
SHA2561c38e59a9739c8398bf67219c5d772534e5d401fe41259c49d881e1eb5ae6850
SHA5120bfb580846eab2c233d73d050701f487f3f1a89e438b41c685fb80462aa09ed0a0cc326136401d32789721a46c7705430d49e67dba3aa28c980172ec152acd23
-
Filesize
6KB
MD5a8fe5ab393b9db81915c0483c4059c68
SHA1b3df4313a66a31a80c0314f31082d5dd00a8c2c4
SHA256c4f6158fd307e85eb4f886bbb044c850740a3bd92481f7c0ad7a36be7d32c25f
SHA512bfbda9cbb6aadffd7f95bcb33dcd6a73f5926fe1c5ed99129b9fd081ec58e4a65e691df8e96de97157166d882e09f08bbecda9251f38ce7eabe80308e0e89a16
-
Filesize
203B
MD585e2b202798d5fabd669e79e6f770e38
SHA1a295711186b575fc1eadb69ab70a74f40ae0914e
SHA2564b8fd22927f12428ea82085c66518437a1a6d6c4ff07e9d800aedea2fc880582
SHA51251dbb2a9e1a32882e147c227c0af6b3b793c4b506a23d979a4e12b44b9adfab23a4748156dc251151a632769eb4fed6855fecb4bde3a631f9f62f71c91fc3f47
-
Filesize
203B
MD5c8f18d36a215ca79a46b94c5eefc7063
SHA1d6c13f4a9b0ee55ca6743e81f00bb53942f6d688
SHA256ac4574cf381056062fca85940164ac861a41ffdaceeefc92f3e0616dc8ce30ad
SHA51299fa7414c3219b96d131f3eb31d2f0e4565694c55ae1d53b2f7d456ecdc820e8fc26864a8b0466371f4a2f14c42e1640de0b79f8b1d3218c247fabf1d583e942
-
Filesize
203B
MD5546af0f9876a20673227798b15eb7263
SHA17402efeec1cdb32ee5ed16c71a3625417dd34871
SHA2561aa0fc07122aaa122683b7bce301f188293217f17c857ac1b7ef49d7b54b2a3d
SHA51234ee61ac1ba045da368caaf2d53351cbff0271058c87dda6d8826d2a28170efac26923bc87c9446152b8e3b0d58568c77b3603bb0427afda4d375dd039a4a6ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c0eaa536b8d66cc0febd36f7bb0518fa
SHA1749538e11d6ca0b447672edfe9ed6fa7d75e7695
SHA256da4c5a271443da6f64563f21b7a781f02a03df642d85051996c7f52a26a42852
SHA5128a9493a27a2f0e842c24f3fa5af45386e13cfe36b53d52774c44ccc3a340596dc651262466f31f82c9af854a7d8e8f5bbd1d9e6789b9920a5edec618afe9530c