Analysis
-
max time kernel
24s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 22:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.fedex.com/fedextrack/?trknbr=742067054657
Resource
win10v2004-20240419-en
General
-
Target
https://www.fedex.com/fedextrack/?trknbr=742067054657
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 3640 msedge.exe 3640 msedge.exe 2156 identity_helper.exe 2156 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3640 wrote to memory of 716 3640 msedge.exe 84 PID 3640 wrote to memory of 716 3640 msedge.exe 84 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 468 3640 msedge.exe 85 PID 3640 wrote to memory of 1892 3640 msedge.exe 86 PID 3640 wrote to memory of 1892 3640 msedge.exe 86 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87 PID 3640 wrote to memory of 2552 3640 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.fedex.com/fedextrack/?trknbr=7420670546571⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6f5046f8,0x7ffa6f504708,0x7ffa6f5047182⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,17641392715903559540,543953275258714974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:5408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\915cfbcf-c670-4495-8c02-a75d1d5972c6.tmp
Filesize7KB
MD5f77ffc16abe3e5777f215ca5a53d91a5
SHA10e1ce10cde56023c456130f3a508c532c8f79efb
SHA25623e6662dad4e20b9cbeaea7b83b7cc1bf118cee4cf0a256cc99af8378cebb49c
SHA5124cbca9046f5a7c0ca43190d0972763fa14ce345da7214753ce63446e11a2e0496536116b207fe858665a32b29f82aec5b7446fa04fda4f2db0cac0130d4797fe
-
Filesize
5KB
MD55db33a2e7017d58d9a408e647b1aa540
SHA13d3b84de83f33ec0900f78d0963c903fa8400bbc
SHA256d1dc2a09630206876b82f8fdf2cce3d1787f1eb6d9b1bc13d9e5caa166f24fcd
SHA512668864c1897c526906f125ae6dab6175b205c581663395611b4eab0b181bf24732b2e04cf5733024037ea5bf224774bf3181b5802ad2ab7482d0cbf0eb7d1334
-
Filesize
1KB
MD59a0d475de042379c6c55a382e1ad9140
SHA1931d21102d936ac02d7613d45ff2715ce71145b3
SHA256aa4b6a5bb9c380da2366272ba5be8f7ee29cca9e4981192b362f13af9ddec152
SHA51269783820f1fa2c9fc9972ba5b2142bca685344dcd9564e4a7086c078a43025ef842e96cc098307619976bab0a1fd1185611dc1bd044b7aae345b3989895a25a3
-
Filesize
1KB
MD5cae831eeec7300460507d93f0cdec1f9
SHA15ef60e7b06ca72dbba693764fc6574cc1b514cdf
SHA256a82e392f370765504b12311984bf94703dd3cefe8b505865bcc26e0c337cb78b
SHA5129a91caea09f5d5252190fe21577fb74524986181b5c60037d540e158a2f603aa8cfb24265957e14ce6e64a2182e8f5da5b6ff7493751d9fb84a2c851dad589b2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5481e8ebdcd214cedf55391e5a5f8be3d
SHA146c2fe0f6497d6ff270fb2bda7cf7e47fe058f53
SHA256c8b2643d9cff53f7c0ce67c850566ee93b96ee1c591fc7eac377c5ddaadd57be
SHA51270ee6c0d662015d514dd4bd10c83086cb8336a50bdbbdccd2f0dde3ad4350554348050a8261a630b117b628ff19324550821cd08c1f4b7019bc7e9bfd8ccce50