Analysis
-
max time kernel
145s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 13:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://c.howazit.com/UnSubscribeEmail/7104985741/1GMD1IMgKyL
Resource
win10v2004-20241007-en
General
-
Target
https://c.howazit.com/UnSubscribeEmail/7104985741/1GMD1IMgKyL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3980 msedge.exe 3980 msedge.exe 2408 identity_helper.exe 2408 identity_helper.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 5036 3980 msedge.exe 84 PID 3980 wrote to memory of 5036 3980 msedge.exe 84 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3652 3980 msedge.exe 85 PID 3980 wrote to memory of 3132 3980 msedge.exe 86 PID 3980 wrote to memory of 3132 3980 msedge.exe 86 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87 PID 3980 wrote to memory of 3456 3980 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://c.howazit.com/UnSubscribeEmail/7104985741/1GMD1IMgKyL1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad86346f8,0x7ffad8634708,0x7ffad86347182⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4651576322234221888,3033803036719320510,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5f90b8eaf6fc99ecd573635a1e4b5942b
SHA13624fe8c552cf82aa69313234be293c554d5c0aa
SHA2568ad451dae009426981113fa37fbdb07cb0a35dcdcaa1743b70a257ac54ad78c2
SHA51219ac467590c518b8ac32145d286bc5061087912685336e5dc6a0cb1ad91fb2b2097941d6c6545040913185ec1db779136122068675b9c2ee4bdf532cb48a7fb4
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD55ba1a24d683229f9638b7207c1b0f1d7
SHA146c112f37d8cc0e475a35b2a6bc376f3b5532c2d
SHA2564d88ad8f7a808b49a1adda12680d9916a16f5883db054c16e7a69ced53571fff
SHA51275a33e6e76c056a07fb76dea4dd043b2886c6c1466ff5ae430641dfafa15fa4702c4be66c437c7218b9811526490086f77a9099eb4c87b03dfbe6cfc3562698b
-
Filesize
1KB
MD594e56ff7a8561c2292e166ce07cc78b6
SHA10609805c577d320973e6d3b7e0de4d568be28ec7
SHA25682caea6cd52ec4f7d9800585efbf58260135528aa4c7593368fb204e01e435ec
SHA512933411585fa019b9a9c8e37eb6dd3406ff569bd70ebcdb550602d6e4563aa98dd9e83e0188807577c93742df430b1e4b228cd4592d8ae001a64f6848cc5e7073
-
Filesize
6KB
MD52dc470b1f1a0073ad9e6d358c719ca59
SHA1a59a59d548932ab3fb1f1cc2557c0771d0f3bffb
SHA25660f9cd1853468ef12a7ba15e69971d6a66274fd11862e6e1954ecd29417c0730
SHA512d11d1de19ec2f21df8fc51eb931def06611a67b0c70f5cd40c8c0119ab6f9c8f7249d2ceee72fb83225a31da1ff029f09aef1c7091915e5619d19eaa5a5791fb
-
Filesize
5KB
MD5adff3720b2d0c69e8b7e46856c3adc4a
SHA131668462deb82e2f9267ea6094131bf7f4b3df59
SHA25608703ad12ac5c3e131ea233ab414978b545b2f22d88c117760985d2e5c2e97c3
SHA5126aae36beed91b5367869356dfe7f026ccf40ec2a565e324f771de6cddbe1838ad90697d4a16602f2625e7cfa7be9ff9ea0cd7ab4cfeb1866d9840e2f4f64d1de
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145