Overview
overview
5Static
static
1AAMkAGVlYj...QW.eml
windows7-x64
5AAMkAGVlYj...QW.eml
windows10-2004-x64
35129033.png
windows7-x64
35129033.png
windows10-2004-x64
3VM_Transcr...f.html
windows7-x64
3VM_Transcr...f.html
windows10-2004-x64
3email-html-2.html
windows7-x64
3email-html-2.html
windows10-2004-x64
3email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
AAMkAGVlYjNiNzA2LTQzMTEtNDlmZi05OWE5LWIwODdlNmRhZGQzMgBGAAAAAACB6YGTmo7ZQqxWBA_VRAiPBwDCO0JJFRtyS4QW.eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AAMkAGVlYjNiNzA2LTQzMTEtNDlmZi05OWE5LWIwODdlNmRhZGQzMgBGAAAAAACB6YGTmo7ZQqxWBA_VRAiPBwDCO0JJFRtyS4QW.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
5129033.png
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
5129033.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VM_Transcriptac2a35aa5e3b341776ca4cef4eee55eb85797c6f.html
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
VM_Transcriptac2a35aa5e3b341776ca4cef4eee55eb85797c6f.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
email-html-2.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
email-plain-1.txt
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
General
-
Target
email-html-2.html
-
Size
286B
-
MD5
0d91906c3c601ab03fed42f81c115972
-
SHA1
6f5031a58caa9c917183a481758bbb0d3d96ef87
-
SHA256
1a8c7f60a0ff0cc261ac9ada0e39f41996ed5fc9ef07972bb7fafa070064ae76
-
SHA512
336aa5249769df9120ecc29e9fb9eccb9e1fe6941fd943b33605d51bad87b3400c3c6b7d54758dc2b96c6f72bc7e37e558826430ce28c2bb1711a39e598444bd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 2444 msedge.exe 2444 msedge.exe 3992 identity_helper.exe 3992 identity_helper.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 3476 2444 msedge.exe 83 PID 2444 wrote to memory of 3476 2444 msedge.exe 83 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4904 2444 msedge.exe 84 PID 2444 wrote to memory of 4520 2444 msedge.exe 85 PID 2444 wrote to memory of 4520 2444 msedge.exe 85 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86 PID 2444 wrote to memory of 1428 2444 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffeffe546f8,0x7ffeffe54708,0x7ffeffe547182⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,16727864303661947109,4422210867033436797,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
5KB
MD56e318d7ba56cadd9a493ceb12316930e
SHA1feffad2c71a21ad0a822bfff24825642585c5bf6
SHA256850c5af50c15688577fd6817958beb8b28235030574bd9429e8910b67b67d636
SHA512d0c1e21d57fb2937eee7a88b2bd2c4eafd27cf9aba500d3edb64058aafcada033c9da188cd8fb6bd1559325b80994bac2392974e45a57d7859a5c9365ec82d2c
-
Filesize
6KB
MD5d146a8d0725230af3029ba32b37d2989
SHA1bec74cc480d2280bf824d4ed49e16fc322041c83
SHA256122d363169bfccf1f8c647c36e970ad13ac96413a7b9a5543172a16093ec3859
SHA512c088a188f7f25cfee6e4ef6a1889002e1d2ec5686fe92ecaf71de7f02bf3efa7ddde09d40ebf71a4d9e6cf71b11bd904b585afc67ff3527684a64809951b4f3e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD53b72217065493063a6aea34bed941512
SHA11e7c1f4f4bd642936124f22de548c9fde9a6f30c
SHA256880e7937ef6ec1ce341471d2c8ae35a9921a9c7952b37bb1e238bbbcf37d69e9
SHA5124e80efc146545ed355e3d4ff083fce08334f013a80528061f566a38a6ea43c32c4d4a49d7d0881365db985dcc19c22b66f08cea24aedb0a6973177cf6caba3d7