Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
9a3ca97448e0b67bbcf985d48dad8cba.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a3ca97448e0b67bbcf985d48dad8cba.html
Resource
win10v2004-20231222-en
General
-
Target
9a3ca97448e0b67bbcf985d48dad8cba.html
-
Size
81KB
-
MD5
9a3ca97448e0b67bbcf985d48dad8cba
-
SHA1
34e723652b0734875de21fcedca62a14862f57c7
-
SHA256
04350379301ba9630c42d9cdf90c4582c16691c92dd74e3e209331c088298498
-
SHA512
bf2237d2a7ee9ede7165ca6223ea1699f3ab0cda724d24d4c393a4b3f3893f7d671dab044a3e77d478b509771fa6fcebe750524ae2d0c7d3a5d7c7f09adc2b5e
-
SSDEEP
1536:n3HH2l5+CJg8P8qUL1SKLYkvKdghhWGQUmiCAM+UdP:3HW3ZqWTaMBdP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2132 msedge.exe 2132 msedge.exe 3232 msedge.exe 3232 msedge.exe 848 identity_helper.exe 848 identity_helper.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 1852 3232 msedge.exe 83 PID 3232 wrote to memory of 1852 3232 msedge.exe 83 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 1720 3232 msedge.exe 84 PID 3232 wrote to memory of 2132 3232 msedge.exe 85 PID 3232 wrote to memory of 2132 3232 msedge.exe 85 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86 PID 3232 wrote to memory of 3540 3232 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a3ca97448e0b67bbcf985d48dad8cba.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d9c746f8,0x7ff8d9c74708,0x7ff8d9c747182⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 /prefetch:22⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16547038128310341511,16953701018463578492,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD546cda9b56cc05d7ff0ecf9c17ff191c2
SHA10be5a5745edd0f435fd96cb2e0808f0c7331cb2f
SHA256fadc2e83f138a5fbaee3dce29ec599cd66f952fe6a3a86ab381e93a42f48f19e
SHA512b77b30179ed56f6ccb9bd5436d31d693c764f524e3c5f6975a5c3296c072a535c94c2224d201a2de4cc2c2d99c0ab9063e686e9853ab6c2110d898e984d9698d
-
Filesize
1KB
MD53101008d25802732068186d34a0f1d51
SHA198cdd560271b2cd079d9b125e02359b18d35f345
SHA256a8089fa792b80b90742d48ad1e202caad37c3159b4f44c4dc66abb18fe89f3a2
SHA512b5b83a1a563422878f597e4c49da813d58cea34170d89a3be5be3c51a5b1c80b221de2bfaa82d8b00bd6274440996807804e26b2cf720696d75413171620c9fe
-
Filesize
5KB
MD5d02308e1d57bd3ac62ee7a36ef1c5caf
SHA1d0a0024bebf7ccbcbc2893291fb785c465b2ae05
SHA256fe11f539f5e1abd33d6bda74da17140b306fb47f885f56cda64bbb0420fe2ca3
SHA5124c0c3c1fcb0585d5ba7036e28e08a2f7cf4f85dabf6309188eb06cd63da5aed38ccbddf7f5f9c9114225bb3e55f60370b83ee3f73bcd5cb4c2663ef7e5d24fe2
-
Filesize
5KB
MD59513e544f3f73824d1bbe472149908df
SHA19ed52c0733381d82aa3e1c09d9d58ffb2f0980b6
SHA25616ae005b04ed9830f9c45e6eeae1563ca9e8f021847090c21b7870d2782ac9c3
SHA51204929e0a1560ccd792677cffbd6bc3ba51fb11e518df79a82edc370d17ce5c1aed8b0537f8d9756f19e76c359cdd0a935242b7e31b074475c1d0481a7e45ebda
-
Filesize
6KB
MD5858656d3f00fa17ae535a4b76c405574
SHA14af8a4a8ef926f8682bced8f9f56c60206c6b521
SHA256dfb4d5fe48afa571f83f91e421f3b2d29e5dc7bc54acadec30f5b2fe1dfbc7b8
SHA5122231de6db3e254022fed8ea79c9859bb99426f1e9c060ff56b5e90bbd74cc6b126e5f4bc570ae424585a4ea345ebae0e924e95726b5318b8c873fd76a264848a
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5856497d5f0efd07098fd49a8ac26ef5b
SHA15c34bfbe6c32c317daec68f6d83a2f35634d5331
SHA25667b725e158472180f91826de916cf119810d4eee6af58a2f5946b7700052fab6
SHA5126e919e0db042beb7cdb8490b4c595802bd19250d86668fdcb202b700cff0b4a220bb56618ffceea0f181bc8dd91a3f8112b3657eebc9a6d19898e87a73b5424d