Analysis
-
max time kernel
44s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 08:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.texeyechino.com/wmail/u/0/inbox/rdr.php?alt=media&token=033982e3-60ca-457e-b182-18a03119de12&data=WTJGdUxubHBiRzFoZW10aGVXRkFkSFZ5YTJObGJHd3VZMjl0TG5SeQ==&umid=E4537A34-1EC2-B106-8CF3-9437E5170D30&auth=8302603cedbbae3f545329cfe68966411c3ae50d-c723aa0a6a995300815362e9f2396b07b6e4af05
Resource
win10v2004-20240802-en
General
-
Target
https://www.texeyechino.com/wmail/u/0/inbox/rdr.php?alt=media&token=033982e3-60ca-457e-b182-18a03119de12&data=WTJGdUxubHBiRzFoZW10aGVXRkFkSFZ5YTJObGJHd3VZMjl0TG5SeQ==&umid=E4537A34-1EC2-B106-8CF3-9437E5170D30&auth=8302603cedbbae3f545329cfe68966411c3ae50d-c723aa0a6a995300815362e9f2396b07b6e4af05
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 2992 msedge.exe 2992 msedge.exe 3304 identity_helper.exe 3304 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3380 2992 msedge.exe 83 PID 2992 wrote to memory of 3380 2992 msedge.exe 83 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 4320 2992 msedge.exe 84 PID 2992 wrote to memory of 3316 2992 msedge.exe 85 PID 2992 wrote to memory of 3316 2992 msedge.exe 85 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86 PID 2992 wrote to memory of 4120 2992 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.texeyechino.com/wmail/u/0/inbox/rdr.php?alt=media&token=033982e3-60ca-457e-b182-18a03119de12&data=WTJGdUxubHBiRzFoZW10aGVXRkFkSFZ5YTJObGJHd3VZMjl0TG5SeQ==&umid=E4537A34-1EC2-B106-8CF3-9437E5170D30&auth=8302603cedbbae3f545329cfe68966411c3ae50d-c723aa0a6a995300815362e9f2396b07b6e4af051⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9ab746f8,0x7fff9ab74708,0x7fff9ab747182⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11079651097185449771,18321904075405730526,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b18a792573cab2ebab642f459ae9d0a9
SHA14e492829322260f0d142834d72c6cc14c21769ed
SHA25641cadd64a6077e7288a02ab31b6825c844789750db41893a57b4126baefb1d53
SHA512cffc9b3220fe6a10dde7db03dbe3cd30662e719c0a47fa823e6613e85660956d7feab70d6d4e5c6766d91512520b948e486c063977b4ac26817fb269e23b72cc
-
Filesize
6KB
MD5fc42c97780a61d1c4f2a78c424dd151a
SHA178cce35c56f2614ab7e94e2f92ceb098d87a84ec
SHA2567488edbc4bb129ca8a022fd1973b96995ade431f41b4f2738898839b8eb20249
SHA512aef62afb0c885f8dd7e0a04c90e68af64c1ad32c49c4b4ba26c2370affc1f2cc0ad0eda4ccafd6740d2b5b77f5f71fca09b4f9974aea8a453b3e0f1b73b8f60c
-
Filesize
6KB
MD56c372efe11b4b182babc332b7fe8d95d
SHA1cbfebf9285a04dc688e0e82fabc0c8c3dff24952
SHA256c15807d30aea0e06e78e9e643c80bca2ffcdcf8d5dead2604706b407e2c263a4
SHA512d8b6b5eed7ab6ab476cbc31b1a3675999d499b1589fc3cd5c5624d35c2f4c77f3195ff64ab8cc77abd46f9157e48fe257faddb625f69fd8124617d48021a878b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53a5034cbf2d95dcf35a86b8d94e7698b
SHA17e4c70bde517b274392ddab453f2af3c484dcb9c
SHA256095f9056414c53969094834ebb91f8210f584828688a4dfbe39e9e784e77322d
SHA512fc2973d4d9369b31fd706a2b19062749f998e50ad61af53263022d1bc70204576afe8389fe45ca199a322c79fa7039f9b1fcaf70c00c2ee8afcfc0cb4a8d8e9e