Overview
overview
8Static
static
1AutoMail/AutoMail.exe
windows7-x64
3AutoMail/AutoMail.exe
windows10-2004-x64
3AutoMail/S...g.html
windows7-x64
1AutoMail/S...g.html
windows10-2004-x64
1AutoMail/automail.chm
windows7-x64
1AutoMail/automail.chm
windows10-2004-x64
1AutoMail/mx9x.dll
windows7-x64
8AutoMail/mx9x.dll
windows10-2004-x64
8AutoMail/mxxp.dll
windows7-x64
3AutoMail/mxxp.dll
windows10-2004-x64
3AutoMail/sample.bat
windows7-x64
1AutoMail/sample.bat
windows10-2004-x64
1AutoMail/smtpsend.dll
windows7-x64
3AutoMail/smtpsend.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
AutoMail/AutoMail.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
AutoMail/AutoMail.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
AutoMail/SampleHTMLMsg.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
AutoMail/SampleHTMLMsg.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
AutoMail/automail.chm
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
AutoMail/automail.chm
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
AutoMail/mx9x.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
AutoMail/mx9x.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
AutoMail/mxxp.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
AutoMail/mxxp.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
AutoMail/sample.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
AutoMail/sample.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
AutoMail/smtpsend.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
AutoMail/smtpsend.dll
Resource
win10v2004-20240412-en
General
-
Target
AutoMail/SampleHTMLMsg.html
-
Size
1KB
-
MD5
58ed7046daa9f5974818d4e90ac7a36a
-
SHA1
50801cb175a0907bbe5aa9df40898a9637040fb5
-
SHA256
36e232db1e3b11575aa397aee73396ce5f2e2cc8ed9b30eb9f98f0b3d8e42008
-
SHA512
2df5eb5ab7b19f4c314603f2ea7e0a21586917ad8de3d8b82f82459ad3637d67c2eac0a012ad726226414725828ced2d7c0c60fef565f61ee11e26fe4ef3ea5e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 3748 msedge.exe 3748 msedge.exe 1984 identity_helper.exe 1984 identity_helper.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4252 3748 msedge.exe 86 PID 3748 wrote to memory of 4252 3748 msedge.exe 86 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 3472 3748 msedge.exe 87 PID 3748 wrote to memory of 1668 3748 msedge.exe 88 PID 3748 wrote to memory of 1668 3748 msedge.exe 88 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89 PID 3748 wrote to memory of 4168 3748 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\AutoMail\SampleHTMLMsg.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa382846f8,0x7ffa38284708,0x7ffa382847182⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5030945968136271592,9443777653213713633,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
Filesize
6KB
MD52044204db2b8c6dcb01ad35cfe5a71c5
SHA1f111738cc80b72377160537dd39ec387c0193f9a
SHA256df55be1d5e363af0c89fabdd36db623ad11e9e4d652db5948064627860767224
SHA512347b74d073d3b4c81a1c5817c97d61c234b4e507fa35c2bcaf15db5105003b17384a0798fa904fdf81ec641fb341c4e4a3b42ae7c8e4ed619da31f7d2807d126
-
Filesize
6KB
MD5487992138b128db13bf8d8e3d69db237
SHA1d4e0ebef16c5584e4693b5de8a1d591f02df614b
SHA2569e24f8aec4cc77ad057a5652905ab385f8c4e503f7f574a97de528b233aa5762
SHA512181e518b1b8ef3bb70307e0e0e2c7d476224b7168c854542db10c9e706fc87298f620d24f7257b3bce391159d582be3b3ff983a7f9a166865e328cfe6bfdab9b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f9faee45fee5dc4e965dd4f4d1388f09
SHA14eb96d820d8bd45f50d953731c905b34aa16fa51
SHA2564ab3364653ccf28452a51f848447b6e446e82cff96ff3c137ff6879f628ca63c
SHA512401838b245e8eb16e727be9f7fd62f22cbf87155dd03ac00f405a952b1a8847f5d4c6f4a04e0904cfd3bed157eac7d46e680c9f90a9247de7f5f96fbc761398c