Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 02:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vettafi-email.com/url/2874827/64934a7/
Resource
win10v2004-20240419-en
General
-
Target
https://vettafi-email.com/url/2874827/64934a7/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 1696 msedge.exe 1696 msedge.exe 840 identity_helper.exe 840 identity_helper.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2952 1696 msedge.exe 84 PID 1696 wrote to memory of 2952 1696 msedge.exe 84 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 4868 1696 msedge.exe 85 PID 1696 wrote to memory of 2676 1696 msedge.exe 86 PID 1696 wrote to memory of 2676 1696 msedge.exe 86 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87 PID 1696 wrote to memory of 3784 1696 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://vettafi-email.com/url/2874827/64934a7/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c4d46f8,0x7ffd9c4d4708,0x7ffd9c4d47182⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10168209843780280812,12902972659735899026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD52a7d75b6a4ab6fcefe1582d0d979090b
SHA11edd6619c04f26b1d27cb1d2e1cc59283b9acc0c
SHA256275b7122a24335e0590ece17c52614300ca6953182f3f9e0b12d29dd4268de62
SHA51225160545b9710b4e2126d9e2daa853c610006924e580b459d8646832d87c20540265f9133d121bc0294068145fa3a0e5a8be84b53bb3c389485d811a2617edf6
-
Filesize
6KB
MD5e35fe2d473cbbb753a5c65a38b825e59
SHA116f066a60ddf89e3cd620057b26c3ad151af3022
SHA2567851e907a6a17ce59874402fe55fb1fd936ba6a62194542a1b567d8c6f34e7a0
SHA512f0357eb81861af041d0a3eabcf5e06fdf97a59d1b37448d76798910439cdd3611e315534862d1ce2e40d55f14966bcc004c768b43f110542a1fcf7c64863a50b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD53ea08d8c792715efa16d6299ce2b4827
SHA1dd622cff350f274c5e7907a6d0acabe9b6ed25af
SHA25608e0a018f9fdcb237d42ba8f29eacd353df959e70be8388be677df44ff6c00b2
SHA5126ac15d48bdb3d24c9222bf1d78a1d875979613348bf3cb7e2e011b96cdca5a500bbbfb81eecc9f355d69e6c7743c190caf24f981ef37f4435a997a99ad433176