Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/03/2024, 01:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://speednetworks.in/wp-updates/china-mail/cn
Resource
win11-20240221-en
General
-
Target
https://speednetworks.in/wp-updates/china-mail/cn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 4596 identity_helper.exe 4596 identity_helper.exe 1384 msedge.exe 1384 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3556 wrote to memory of 572 3556 msedge.exe 80 PID 3556 wrote to memory of 572 3556 msedge.exe 80 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3472 3556 msedge.exe 82 PID 3556 wrote to memory of 3648 3556 msedge.exe 83 PID 3556 wrote to memory of 3648 3556 msedge.exe 83 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84 PID 3556 wrote to memory of 1368 3556 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://speednetworks.in/wp-updates/china-mail/cn1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaf0513cb8,0x7ffaf0513cc8,0x7ffaf0513cd82⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1776,10337426149492735039,4515994876181474622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
Filesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
Filesize
572B
MD5c50b37bf94093ca62dfb3d6563a1e731
SHA13a06e8e08baaf492bbf1be802671de9f04887480
SHA2561720417edbfe4c8b36117a1abd2e9f9e5e95dee4766b8d5984a782cab96018fd
SHA512b2afcd59c51dd4c4660f5ef25c120ae1ea6d68e8e8878328cd630b6b37278e9bedcb98e5158276dcf5cab14942d1c0aea48e8615b3ca80a82f7f983310445d64
-
Filesize
5KB
MD50fa16ffba255608f1125e28ccce5e655
SHA10013f7e4c72dcb8c21908ddfdab9b431e1a00eef
SHA25646ff8cb5a3e7f92b5a336f452cc5c8b8f9d4cf7012bcce0c6da80aef792f5bc4
SHA512316a7192934bfd67fe190719fc6d76b423df39de7273e94dbc4b91a5e39e062b512e804654c756d4a2a20eb7e9337071a942e76a1cc65d023ca6bc01d7339422
-
Filesize
6KB
MD531b041d54b3b2a726f32d6386ea2576f
SHA1d39825ca5e5ee5238887dd664e96e966bdef1ff7
SHA256bed97f0a5a53b7ccfac9402d02716113464eda1bdecc866b0939255f68c039dc
SHA512d1aa472cb7cb71f215d05e6c3ec44f2a3258729485a6d02681da521a7ec26e112e717e5ea1b4116bee90c4906bc8287972cc3cf78b9684f2d071c4c9af195c80
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5da8c20d14b39d0afa3a56c8bd106e95b
SHA17023f1f660457b6a83e54ed50cec632f4d6faf9f
SHA25622a1012b793f5f2b97bd67e15291ba3123565d08a4cb7f899f3f5d0cbc33993c
SHA512e3ec40112b4eb2d39f5e24a62ad8ebcd57b3337e31c08fe56d1733abe95a5be52d3ed3a75a66622888d02a32a719293dd2b2b027a1a6969bd340f77e9c4393fb