Overview
overview
9Static
static
3155绿色�...��.url
windows7-x64
1155绿色�...��.url
windows10-2004-x64
1RemoveWate...64.exe
windows7-x64
1RemoveWate...64.exe
windows10-2004-x64
1TCPZ_Overview.CHS.htm
windows7-x64
3TCPZ_Overview.CHS.htm
windows10-2004-x64
3TCPZ_Overview.ENU.htm
windows7-x64
3TCPZ_Overview.ENU.htm
windows10-2004-x64
3TCPZ_Overview.ITA.htm
windows7-x64
3TCPZ_Overview.ITA.htm
windows10-2004-x64
1tcpz.exe
windows7-x64
9tcpz.exe
windows10-2004-x64
9tcpz64.exe
windows7-x64
9tcpz64.exe
windows10-2004-x64
9Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RemoveWatermarkX64.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RemoveWatermarkX64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
TCPZ_Overview.CHS.htm
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
TCPZ_Overview.CHS.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
TCPZ_Overview.ENU.htm
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
TCPZ_Overview.ENU.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
TCPZ_Overview.ITA.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
TCPZ_Overview.ITA.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
tcpz.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
tcpz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
tcpz64.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
tcpz64.exe
Resource
win10v2004-20240802-en
General
-
Target
TCPZ_Overview.CHS.htm
-
Size
8KB
-
MD5
ad20ad63c9d012c5ba3c4f765b52494c
-
SHA1
8a8e695cd2ea77636be24f9db63d79b47e648a83
-
SHA256
450090734421906bd13f649520e51d990aa16dedf5e1fd8da80f54d13773bd4a
-
SHA512
c9d0a15f5a4a6cfb3ad1bc8b2bf510ece0bff7fdc0654ead5ba1361f784de0bb20ae5dffc9506186fa91112ded5af8f3086ae580ee46bc4f906ce5088de3477c
-
SSDEEP
192:Q2CVjDtHPXTTVRFQM3mRLT3KIjNS3WAwu+3x+5syBNW+PWN/si2b:/qj/mRLLKw6N7WNM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2428 msedge.exe 2428 msedge.exe 1060 msedge.exe 1060 msedge.exe 3888 identity_helper.exe 3888 identity_helper.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 3364 1060 msedge.exe 82 PID 1060 wrote to memory of 3364 1060 msedge.exe 82 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 4736 1060 msedge.exe 83 PID 1060 wrote to memory of 2428 1060 msedge.exe 84 PID 1060 wrote to memory of 2428 1060 msedge.exe 84 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85 PID 1060 wrote to memory of 4500 1060 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\TCPZ_Overview.CHS.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb50146f8,0x7ffbb5014708,0x7ffbb50147182⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15963686796249031360,9669293399752566485,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
6KB
MD5b691abaf18a0996ebd2ae3a17244f407
SHA1402935645f9a93b6750dbbf22817e26dc6759e66
SHA2564a9a417dcb4f4cc6329ffeec7c096596b5e33bd0b78ee87d2653103bd01ac86f
SHA5120cb0a0e95199d349ae9e0034a1ac020d9150d391fb45e21a4694fc0a9a78549be7d9be911751913fe3cdc78f70f19b0958f58c9c3e33d83c907f011e04da3838
-
Filesize
5KB
MD5d39614e9a235ca2a534e719aa7e999c8
SHA12d52e53557d26279407b659d2f95e986086d7c39
SHA256c5610eddf382d06064bb25708a7a44305d9c9742acf33ba2e57d4a0431600c87
SHA512d65977373998cb3a7a476b1148d394fb5597d22a6ab661b4829e840c65eaaf4be329396e8b1a514884740a14b7bb18de93cc2c2d6e7aeef79ac59359e47d5c43
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ae23ec61f9f57ba5f0d3220369b13022
SHA102bb8d149e76894501208888afc408e8dfb60951
SHA25621cec6bb661320d90501a90f6e0e2bdcd2e5aafd0ef9fe6a3f6e7fa4b5c538af
SHA51278f4eea0f4da5bfab0e9a9f4c7ca4393695478d944586385cae8a0170868329827f5578eb30e52f7e58f0475a59042a3846534576f126baca69b46c59f5e319c