Overview
overview
9Static
static
3155绿色�...��.url
windows7-x64
1155绿色�...��.url
windows10-2004-x64
1RemoveWate...64.exe
windows7-x64
1RemoveWate...64.exe
windows10-2004-x64
1TCPZ_Overview.CHS.htm
windows7-x64
3TCPZ_Overview.CHS.htm
windows10-2004-x64
3TCPZ_Overview.ENU.htm
windows7-x64
3TCPZ_Overview.ENU.htm
windows10-2004-x64
3TCPZ_Overview.ITA.htm
windows7-x64
3TCPZ_Overview.ITA.htm
windows10-2004-x64
1tcpz.exe
windows7-x64
9tcpz.exe
windows10-2004-x64
9tcpz64.exe
windows7-x64
9tcpz64.exe
windows10-2004-x64
9Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RemoveWatermarkX64.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RemoveWatermarkX64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
TCPZ_Overview.CHS.htm
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
TCPZ_Overview.CHS.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
TCPZ_Overview.ENU.htm
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
TCPZ_Overview.ENU.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
TCPZ_Overview.ITA.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
TCPZ_Overview.ITA.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
tcpz.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
tcpz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
tcpz64.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
tcpz64.exe
Resource
win10v2004-20240802-en
General
-
Target
TCPZ_Overview.ENU.htm
-
Size
8KB
-
MD5
602faf5c938a319031a8cd54c5a30ac7
-
SHA1
b23299d8db3fdfc25a9235de5a621f086cd89e16
-
SHA256
7f2763830e42db659d3872dae1d39febf5d8d1ea9a7027fc4a54fa3ee96d7355
-
SHA512
a8a62aff2a4ff930c758f428403dbab6eb3b0ef5983dab0bc6b7a9f05099f4b8f7ff05c4672e1c33a9811d4fea938b1886fb25a35574f25d6e979662b64bb742
-
SSDEEP
192:Q2CVjDtHPaOtX5CZaIOl3HIlL93cp003Zida3v4TWqzihqXeQjX0adPimwe+8s1x:/qaOiMIOBde03ZiA3wK/hkbjX0aZfwQS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 2812 msedge.exe 2812 msedge.exe 4108 identity_helper.exe 4108 identity_helper.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 3704 2812 msedge.exe 84 PID 2812 wrote to memory of 3704 2812 msedge.exe 84 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 764 2812 msedge.exe 85 PID 2812 wrote to memory of 3048 2812 msedge.exe 86 PID 2812 wrote to memory of 3048 2812 msedge.exe 86 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87 PID 2812 wrote to memory of 1480 2812 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\TCPZ_Overview.ENU.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c1846f8,0x7ff80c184708,0x7ff80c1847182⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,8720256220613683858,12683393786632289533,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5278c460c710c27e196ff80b574ff359c
SHA11cd2dd7e962b927cd6d9722edbcadbdc32235450
SHA256bd08f08065eb7e1a059ff87856c69c9f3784a562d706c71b22be2dd6046d35ed
SHA51284c91bae6dcc4809f1796248b270d798af925f4992ee000ce8b24c91cbfe7b19374ea583d2d41e8ceee09d4132040a616c591bbab374935e61e5c0b96e23751b
-
Filesize
6KB
MD50bc769faa5d373ca971910f693035ecf
SHA1096f0ef23a2ef27714e5a04abcd7d15b6dce58a5
SHA2568945d21b8f1ef6fb00b5a2f028c29c0425582f83ca4e63f3d90d8a8447bdf660
SHA5127e110af855c63c9e858e3e5e0631e14c3d9d15d5a0d8b4748341669cab80e73cf3f79f89b8c0df78f2d839b8ce65f38cbccc73c18010aded9b79311beb461fdc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fd8e023b5740bc2e23cf81588262ff57
SHA115e250f21a9ad87f50dbd2d8f039c6fe7ca29501
SHA25663392eb23743577617b4977c94ecafa98bd2db2d56b2b4c45f15f705ebd20188
SHA5123fe30270356f2dd0803e928b01e09dfb322687c6b5b878d153609068b16a005e5fc9259bf53407d09f873bc131d4e195ba0b4b4bf73d53793e7dd4c7074ef194