Analysis
-
max time kernel
150s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
9a0a9b847801d2fdda9179a97f4550f0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a0a9b847801d2fdda9179a97f4550f0.html
Resource
win10v2004-20231215-en
General
-
Target
9a0a9b847801d2fdda9179a97f4550f0.html
-
Size
322B
-
MD5
9a0a9b847801d2fdda9179a97f4550f0
-
SHA1
183e0ad74c32b49719192dc8fb879ee9fcaabdf0
-
SHA256
b559c6bcc8880b419a01eacbea097ec5568ef6e92905c5227f46003c0a5a1833
-
SHA512
ed856c3b453e38e6e4ecfc98268c1e748f865aebd569100f1f8021229b5a12b54beed1c87f4fc0543d3f36be4eace8f17214620441445ef64bd9a9726e634535
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 3412 msedge.exe 3412 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3412 wrote to memory of 5036 3412 msedge.exe 46 PID 3412 wrote to memory of 5036 3412 msedge.exe 46 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 3784 3412 msedge.exe 85 PID 3412 wrote to memory of 4304 3412 msedge.exe 86 PID 3412 wrote to memory of 4304 3412 msedge.exe 86 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87 PID 3412 wrote to memory of 640 3412 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a0a9b847801d2fdda9179a97f4550f0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff815b546f8,0x7ff815b54708,0x7ff815b547182⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5375223400105991101,17557437135661231884,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584381d71cf667d9a138ea03b3283aea5
SHA133dfc8a32806beaaafaec25850b217c856ce6c7b
SHA25632dd52cc3142b6e758bd60adead81925515b31581437472d1f61bdeda24d5424
SHA512469bfac06152c8b0a82de28e01f7ed36dc27427205830100b1416b7cd8d481f5c4369e2ba89ef1fdd932aaf17289a8e4ede303393feab25afc1158cb931d23a3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD57177bb86599df312b23279a8e62de992
SHA1c5ecfebd4944923dc5b7ac2550339dfcbd77b6a3
SHA2565043afd2737d7ee5cac6e5e3a6953625ab3a3c09c1d366f8f4b56aeb5226774c
SHA5126bc7c0201865065d16f17384253fb7a99c7c1304ff5a19150de90d16366550d4a2eb3e8e81c0fad73ba3206e21dce8b1c0ca752d4750f0fcce6733407fb19b91
-
Filesize
5KB
MD512bdd6642d613b328383b96a6a8a9e0b
SHA1a5612010791c0e4ec9c5b91ee3ac1926cb3ae057
SHA256cf5da8067caa09140b3c178b4dc9cc2ec14d3884ff55fdb507d770796dce55ee
SHA512b03ef8b55863ec4d2a78b21695cb439b0e61718d9714dfab6f5a1604fbb3325a39f20a2a134b6c814de3423a0ac69f658c43ced54daeee49ff92893028fff5d4
-
Filesize
24KB
MD535f77ec6332f541cd8469e0d77af0959
SHA1abaec73284cee460025c6fcbe3b4d9b6c00f628c
SHA256f0be4c5c99b216083bd9ee878f355e1aa508f94feb14aeebcfba4648d85563a7
SHA512e0497dbe48503ebbf6a3c9d188b9637f80bccf9611a9e663d9e4493912d398c6b2a9eab3f506e5b524b3dabbca7bb5a88f882a117b03a3b39f43f291b59870c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50f840cfac89317493a841a3e4fb2f2ce
SHA179d567df42e1ec41b4e1f317df20a6fd4303f266
SHA256763ee6cde2f8179e311511b4e74653e7333857e20a1056b806764b5a45ee1dec
SHA5128f061c447654865427b779d8fe6367f29205fd338048625356b29bfab228fae862debe7938cf73ef400144629d7a6bb2b8e412736949742b0a7ee9183c6a282e
-
Filesize
10KB
MD5119f671024bd78793d77e6cbc2d64d96
SHA13a249e6736885103f15bf28a48a8d19e97e48363
SHA256c86e2d004491e68ebc439267115d1d022949b35b70661100d921b0c6f5557e75
SHA5122ba719cf39cca9c8c4b9455f8de15242df6f869e6a41dc927d93e947e105d76d146f59be0879815165d1ba9cd488927ebe1e486b81b0d5d1a1727290cb796ca2