Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
9893e902dc556cdc16cf86e7dce0c4f0.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9893e902dc556cdc16cf86e7dce0c4f0.html
Resource
win10v2004-20231215-en
General
-
Target
9893e902dc556cdc16cf86e7dce0c4f0.html
-
Size
12KB
-
MD5
9893e902dc556cdc16cf86e7dce0c4f0
-
SHA1
b8cf79a1c2ceb12a921725ccd233f7429b8baf0a
-
SHA256
d68e0584e72f7ccb0f3280a7be8a0deb11bdbd8e9715f3d4fb0b2ebd2fbf8f99
-
SHA512
04430a659e85ffb94efde6daa1f888d29ea75b979f88b3f8003209ed0fa9845705bf9e2ab5a72788871e40409b0a6c10baf8191cdbcd548956181839046ab26f
-
SSDEEP
192:gpMpV31rgTBtxvafB4mISEH2KkaYXSR41FYFcHoqcRHbroJPr42:goBytYRISEH2KDOiFcwRHwZ02
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 4232 msedge.exe 4232 msedge.exe 1028 identity_helper.exe 1028 identity_helper.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4232 wrote to memory of 540 4232 msedge.exe 84 PID 4232 wrote to memory of 540 4232 msedge.exe 84 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1272 4232 msedge.exe 86 PID 4232 wrote to memory of 1960 4232 msedge.exe 85 PID 4232 wrote to memory of 1960 4232 msedge.exe 85 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87 PID 4232 wrote to memory of 3336 4232 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9893e902dc556cdc16cf86e7dce0c4f0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd7bd46f8,0x7ffcd7bd4708,0x7ffcd7bd47182⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8763532737255798698,9128022207296529043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5dbd67b9bb7b70f54f6f9755a6b9684c4
SHA1bb61064ff1f31589475151b022275b745dce78b4
SHA256712c6e57fb6c463760b35fb6b97e9aa3f46e4ddc79a48e599433a824427f619b
SHA512af240fdf16135acc91cfba63c4eb804d33cbf78d0d412cf633220d2c05b8748a9754133316275fc2a3ea0b4422dff52dd30a904499d5498cf572fc38f46a727d
-
Filesize
5KB
MD5050d0058c82a0e222412492afa5741d1
SHA11e40e273cdeda4db3529b6499a0f2c1be0339fd2
SHA256647c223b9c17003ea8fc8006dbd8a027414edf04b3ae12bce8b285ce6190dbaf
SHA5128f4eb13bfc57147a5fd6b36930cce74dee16a16ecf82b7ec9c9d6529d98425721742edf7dd48496cb9cc1d839c09ba277bcd2eb204e963d6b124da21dce8e3cb
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD563decba85cda81bb0c9072d7e095d0e9
SHA142f09b7bc83f30ce9a346f482cc81e76d97f37e3
SHA256a1e92e16bdc305d0ff56087866c39a74e383a681be25a96fe4284403f2c89133
SHA51234c76211645d4d1223e7276f732290014616a498df59cedc346a09fc5c6344fa559205eeb90ed81d90d10f9d5905082ff160284eb71bde2c635c2cf31602ffa7