Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
97ebd37e603e1c2c28f6425807252fe7.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97ebd37e603e1c2c28f6425807252fe7.html
Resource
win10v2004-20231222-en
General
-
Target
97ebd37e603e1c2c28f6425807252fe7.html
-
Size
14KB
-
MD5
97ebd37e603e1c2c28f6425807252fe7
-
SHA1
af598ef778bcff6609fcfe145100055b63cabf80
-
SHA256
dc0ad3f4495c30f1304a3d3c779c0086bdefaf6316a1d37721ce260fa89115ca
-
SHA512
f03b6f4d91f9133b9a6512c55b2b81766ecf4a130961c2cc6f4dd9d6b79fa0f1ada7286eaf1c50f5128e0c74aa5e4862c3144d34aa0f299017273e7ee6d59add
-
SSDEEP
192:riffhKb5jcMSHFNYoOMObV92NeBB33P3Gl+WhxSkS0cPYIICv2cTRmi1qJ76lmPf:68cpxQ+NeBBG8WhxSkuPYq2cTB1Qi2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2972 msedge.exe 2972 msedge.exe 2656 msedge.exe 2656 msedge.exe 1444 identity_helper.exe 1444 identity_helper.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe 628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 4268 2656 msedge.exe 85 PID 2656 wrote to memory of 4268 2656 msedge.exe 85 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 4460 2656 msedge.exe 86 PID 2656 wrote to memory of 2972 2656 msedge.exe 87 PID 2656 wrote to memory of 2972 2656 msedge.exe 87 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88 PID 2656 wrote to memory of 5316 2656 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\97ebd37e603e1c2c28f6425807252fe7.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8dad46f8,0x7ffe8dad4708,0x7ffe8dad47182⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,975680837379369544,13246308864274011465,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6ab4bf39-baf2-4d3f-be0a-b9b430aedf23.tmp
Filesize5KB
MD590053430420660e0b28fbfe9eda676fa
SHA1e6da6f0b6aa88f12ca7195c7f4eb00c7e558790d
SHA25652226f15ba493514dc98ea7e1bba7d5cccbd0494418f6e223e3f3e1cd479bf50
SHA512abe54c942bb3e6d0f74023daffce4a1cd1133ad8d7527dac5ed903a2bed4cf1af1f4d2a0ca49b90b92d52b8679c2d3ee96aaa2bdfada79874179f6fccbff611f
-
Filesize
194KB
MD5ac84f1282f8542dee07f8a1af421f2a7
SHA1261885284826281a99ff982428a765be30de9029
SHA256193b8f571f3fd65b98dc39601431ff6e91ade5f90ee7790bfc1fba8f7580a4b0
SHA5129f4f58ab43ddadad903cea3454d79b99a750f05e4d850de5f25371d5bec16fc312015a875b8f418154f1124c400ae1c82e2efd862870cd35c3f0961426c8cd82
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5fe7db68b3647b966ad9c0263ad142ec8
SHA142d7e24636f6a1a4db68d26b4ded8b8c69714302
SHA256d1e9fe334280e6667de23f47350f18a9fad73ea6b4cae1414eafdef36ae29399
SHA5125c51e21405aa1749cca8a0b29a5309afb445e0cce040f53e210c4243c4f2a343dd1986362c8d152046cb9091f4d7595e32d880ccf3589b94e4beeaff50873c1b
-
Filesize
1KB
MD5589fbf3cf9b04fb7eed3e98a41f181fb
SHA167d8fe41ef2fc38e928cd7df82f5d685dd513f35
SHA2561474ca5e33763d54613992cb3bd0f29e504c982c8072b9685a86606097ec512d
SHA51236d1c17bac1f567d4c902de35ea6f0306191f14ba94e02495d0a921c128e4cca82205e7f45452978593586f16caee1852aeb2ef0f0dcfda0703f6a79739075ad
-
Filesize
6KB
MD5b92c7169303f37c34f5b58ed91285894
SHA14c2465b4cec09da18a01686bfa05da76198b17ad
SHA2568d3a4bb3b646ca5547ec5723a8f8fa8d7d584f5b39c051264cc7dfe30cc39973
SHA51261d3aee4a0a8b2ef21e8dc2638a63bdc9722afc55594f385d23794de2d5f6d8a58a0bf87189139470719101a38d15ab849fe6a351016078ccf6f34132b8deb2f
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5620a6fbe20272ffad22037dfe8bd3158
SHA1482991b9f79cba3cdf6781873160b21fd48a87e1
SHA2560835307ead40a87ba0ea082091a1fb45ed8695396bdc39ae70335b6f6a0bc8da
SHA5123a1e94298b0cdcf3d6e85dc2c16200d5b40a7585d5b935ea1be8c8ebd7c3fc7b77b9516fae2cf1acfa94ab5e057c0cfac338d42009623a309b30b7f74866eaff