Analysis

  • max time kernel
    145s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 16:16

General

  • Target

    http://url2958.meca-x.com/ls/click?upn=u001.lMw06OPD-2BfyI0zQ3cVk3-2Fq-2FGurveToBd-2FZa0TJplsXuDfIyyaRIPaal-2ByDjNnoXuDseJ_jLP1h-2FBu-2FiV7hN9HmIL0NjkmlwP0AFX5-2BSqXyDnCZGNl3pz8aVZOvCApxSZ-2Bcn3xVY90hhG6IMpZljR0a9cmHlKiUi-2BgpTbEyHYAYC7X-2Fbm0al71dszxm2HNG4foE9ZZEhykUHAlIQSREnR-2BGD9zhcj004FFjGJfMZzfhD8q0riWefXVThCKhdZw-2F0SNSpEHc1iRAUcVivJ8BYP44lwxucQABaBpeQgNgKWgwYP3UsqspvhqYHjODI6DsOtz7uK-2BDqRDHxEpoKGfs9DZyzjPadTHLheWfniqyRWh2CRFHPpo4KAswWDoNf2-2Bj5oRuyOlM9FUrrdPAIDwz2T3ca00qG57uanHzxN2D7-2B5QitQ5wbMFtxbS3c5R0JUssJpjcIokeQG4mEJiCQ6k96iNV1ij-2BSKVzsEP9Pa3vUL2xUZHwLv-2FyXd7N9YimAkkrYEsHtLZAYsO2XooFUpon8nDA3mqxgb5w4QDqP7QrBgZNyRD6uy6-2Bx-2FuylAg2giOV-2BSv2a-2BFf30Jx0ODEtaD7IzQrMj8S-2BQNMqLPy30FeOSCqEVXqqqNcnZupXGvJ94mqsCgwfIRCVfOHdYKb7Rdh8HhewsII-2FOg6Gr1mNMGnfA6anxgNX9-2BBMz3Gt-2F13D7skXGwol9s56tQf-2B20wj6HfQyWeMaoDToSh5U0ySL9Ba-2BFZB5Ff2gKCqPw9ZzZGnpSkwbTnmEyrWXwSHWaOPyt0A-2FOk7ZWbol7u-2FV4B-2BwrWYwQ1cuVlFmG7TyIiP8lzbIFDojShzAoV2Qj3-2BDDXMR5wPRzgdXfEl1EJP6JPsW8D-2F7WMzNPyj1GdCy-2F9aVMLZOVQkN8T-2BV9HoDOpFByCABW3MIkU-2FbQ9pKHfm-2FBnh4wONnEMeG9cA-3D

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://url2958.meca-x.com/ls/click?upn=u001.lMw06OPD-2BfyI0zQ3cVk3-2Fq-2FGurveToBd-2FZa0TJplsXuDfIyyaRIPaal-2ByDjNnoXuDseJ_jLP1h-2FBu-2FiV7hN9HmIL0NjkmlwP0AFX5-2BSqXyDnCZGNl3pz8aVZOvCApxSZ-2Bcn3xVY90hhG6IMpZljR0a9cmHlKiUi-2BgpTbEyHYAYC7X-2Fbm0al71dszxm2HNG4foE9ZZEhykUHAlIQSREnR-2BGD9zhcj004FFjGJfMZzfhD8q0riWefXVThCKhdZw-2F0SNSpEHc1iRAUcVivJ8BYP44lwxucQABaBpeQgNgKWgwYP3UsqspvhqYHjODI6DsOtz7uK-2BDqRDHxEpoKGfs9DZyzjPadTHLheWfniqyRWh2CRFHPpo4KAswWDoNf2-2Bj5oRuyOlM9FUrrdPAIDwz2T3ca00qG57uanHzxN2D7-2B5QitQ5wbMFtxbS3c5R0JUssJpjcIokeQG4mEJiCQ6k96iNV1ij-2BSKVzsEP9Pa3vUL2xUZHwLv-2FyXd7N9YimAkkrYEsHtLZAYsO2XooFUpon8nDA3mqxgb5w4QDqP7QrBgZNyRD6uy6-2Bx-2FuylAg2giOV-2BSv2a-2BFf30Jx0ODEtaD7IzQrMj8S-2BQNMqLPy30FeOSCqEVXqqqNcnZupXGvJ94mqsCgwfIRCVfOHdYKb7Rdh8HhewsII-2FOg6Gr1mNMGnfA6anxgNX9-2BBMz3Gt-2F13D7skXGwol9s56tQf-2B20wj6HfQyWeMaoDToSh5U0ySL9Ba-2BFZB5Ff2gKCqPw9ZzZGnpSkwbTnmEyrWXwSHWaOPyt0A-2FOk7ZWbol7u-2FV4B-2BwrWYwQ1cuVlFmG7TyIiP8lzbIFDojShzAoV2Qj3-2BDDXMR5wPRzgdXfEl1EJP6JPsW8D-2F7WMzNPyj1GdCy-2F9aVMLZOVQkN8T-2BV9HoDOpFByCABW3MIkU-2FbQ9pKHfm-2FBnh4wONnEMeG9cA-3D
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff975e246f8,0x7ff975e24708,0x7ff975e24718
      2⤵
        PID:1128
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
        2⤵
          PID:3976
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2468
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
          2⤵
            PID:3940
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
            2⤵
              PID:5048
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
              2⤵
                PID:3576
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                2⤵
                  PID:5012
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2192
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                  2⤵
                    PID:436
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:1
                    2⤵
                      PID:2768
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                      2⤵
                        PID:2216
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                        2⤵
                          PID:5076
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16759949418266945995,2998938202958587817,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5580 /prefetch:2
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:928
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:1572
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2608

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  81e892ca5c5683efdf9135fe0f2adb15

                                  SHA1

                                  39159b30226d98a465ece1da28dc87088b20ecad

                                  SHA256

                                  830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17

                                  SHA512

                                  c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  56067634f68231081c4bd5bdbfcc202f

                                  SHA1

                                  5582776da6ffc75bb0973840fc3d15598bc09eb1

                                  SHA256

                                  8c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4

                                  SHA512

                                  c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  e427651989b9d0fa2bfa5a5d953984ba

                                  SHA1

                                  73c628d67b1d820f25858add09f1d8d81b8fb21c

                                  SHA256

                                  41153afd3a3043d9f1498cb03f704e6599868c6910d18d9f79a95f8fc64bf492

                                  SHA512

                                  d0d47be76d5e1d6810263d3a452e782390d02fe08ccdf40c72bc99bb4f7fc25f5a70a50ba5b434eb2746f201103067d57d49daa9d771b9eb4e610c95f826356b

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  97d03d4c7497325e8615c871f32c0b9d

                                  SHA1

                                  30e6852ebb389cdd15b41446b37af3b7cea2226c

                                  SHA256

                                  04ec99b649631e327702b8ea50517e58159d1b2044e9a33f75be29c56073bd08

                                  SHA512

                                  5566ad925d6128eab82cf2b525c9d2e95f48bc33fa8b084878d16b94bccfbe9c7fe52565c073d2e43de9f987591bb992ce73f4b286cb26c633a94f1334e3615d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  15be9ff4e7559d090099ae52832a5604

                                  SHA1

                                  9600a46f90c8ccb4c99ce82cd9bb6ecd88146bd7

                                  SHA256

                                  04ad641220888c58f05ae38237153c751d10024b495622d26b47a9526150d586

                                  SHA512

                                  09c5be6aad43a1947e730e6585bc2229d25ee209bcd837d8ca991518d3a6c8b06b9365fbbbfbabceeeabbf7258aaa885cdcd495549214a812e39656957e8d0c6