Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 13:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mail.laboratoriolih.com/
Resource
win10v2004-20240508-en
General
-
Target
https://mail.laboratoriolih.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 932 msedge.exe 932 msedge.exe 712 identity_helper.exe 712 identity_helper.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 932 wrote to memory of 3252 932 msedge.exe 83 PID 932 wrote to memory of 3252 932 msedge.exe 83 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3512 932 msedge.exe 84 PID 932 wrote to memory of 3044 932 msedge.exe 85 PID 932 wrote to memory of 3044 932 msedge.exe 85 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86 PID 932 wrote to memory of 924 932 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mail.laboratoriolih.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffca1246f8,0x7fffca124708,0x7fffca1247182⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,9525190655956067159,15368688367234264742,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD568e1361791200b9adff76aaa588b9c9c
SHA17d5e0e4fdf3326713705482bba0ceaeb943163ad
SHA25619ce2f8bfdff20977c366193ee381d53de4e3ea3c9b3a311f0a87d2036a842fd
SHA51210b08f3598416c200e7545e6c95de57e371d87751d8810707d9de8ae0ff401b5093a4ac2be5930f70223f5426d3173241515470dddc98017bc9d74b01f5476fd
-
Filesize
6KB
MD521701f2c6501abf1550472781f7ad734
SHA1f304c38a7d4f24d6f49cbd30ca2c2d137a5d6614
SHA256fa38a3ca3f28f5ee32aaf31373656dbf21542a0431809bd91c7bcbe457f0565a
SHA512f83580d08dda043f9576fed21aee249f10a204649b445936cb1549a1bb194f3a6dc736d7ce39886ee51007ce2e1448ff5df9cc371eb1ba11e6e15d8c252ad7c5
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD526d0e3dfe249c9429976f06ac6f190fe
SHA151e5908c1bdb6b7aaf7a343db3392be5c1ceacf3
SHA25664bdbb33766665e2447da09db23ccf322b9aff586747103a77848229519d9080
SHA512ea4869122dc43e65e8144854f48a87b4250fc9d249a78484e70957a90505949e60170ade7cea444b9c4cd07928d7706cc1cbee9ef7b119bd253713040982000c