Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
98bd1456c9a7287737b4bff323666dc8.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98bd1456c9a7287737b4bff323666dc8.html
Resource
win10v2004-20231215-en
General
-
Target
98bd1456c9a7287737b4bff323666dc8.html
-
Size
6KB
-
MD5
98bd1456c9a7287737b4bff323666dc8
-
SHA1
da5e439352bdd0bf18da0404b45586f8e033069e
-
SHA256
e6f96ac54447b30e75812c480332b025bc7fb9d059ea1f5aa9bc3c4dcf9b4659
-
SHA512
d5ecb4c2b3238e8c521c035784fa6f42fb3569ffe644cc58a815116c9f3bf008cb488982a71c653d6c675a229f082e35627a75f43e3bcba7d0aa6b47d84a6c2f
-
SSDEEP
96:uzVs+ux7trXLLY1k9o84d12ef7CSTU77cEZ7ru7f:csz7tDAYS/gb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 3508 msedge.exe 3508 msedge.exe 4760 identity_helper.exe 4760 identity_helper.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 2920 3508 msedge.exe 84 PID 3508 wrote to memory of 2920 3508 msedge.exe 84 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4992 3508 msedge.exe 85 PID 3508 wrote to memory of 4796 3508 msedge.exe 86 PID 3508 wrote to memory of 4796 3508 msedge.exe 86 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87 PID 3508 wrote to memory of 1948 3508 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\98bd1456c9a7287737b4bff323666dc8.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe353e46f8,0x7ffe353e4708,0x7ffe353e47182⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12374880986432383046,11814982285806081192,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5e52c91a73b3f81704d0633eca99e26b0
SHA140d6c61c9d873373acb9ff4cce033f83b4e9be79
SHA256931f97bbc566668581086fe7de47863fcab32053f19a3ac911dc59c828059307
SHA512e81d0504e0e2c5f9104c27fea6ad8f9715ece33df090a670a15247b1db541f04d3a9352bd0cb8f6f93f7555b564a4a2df0bc825cb856fd86379ed9639feaa3d1
-
Filesize
5KB
MD5f6442e2031d1f8db5eeb493cb5e07b73
SHA1bbae742738a1a007d1112e1c02d8e56016b354e5
SHA256c27e2e2abff9aa1e0ad9ab0b3c81e5efbec33f03f4e3ab07ddfb5596b3fda6cb
SHA51262f90d601746e405868b2355bc4b5a1001954f51413748478d4733569dc8c4eff1b06fc04a4f72b68c64a907da8dca694e0b73b05095e821a60efd10f768d604
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50b9d032f630984a9b572dea8205beda2
SHA19f96d71de1a746da1abd1c071c861f54ae7d2dbe
SHA256afe8421aa6a657390e9db4f213468ec9041bc5a343de47ec50fe4af0cf748993
SHA5129f7330c0f0737447d69461b9f580d494eee64adfaba5510243fcf94d37b4c7fbbea58e45f9f4e258185be6f3827c3a2722ad86fbbaa59c7aa7d6dea741eed0df
-
Filesize
10KB
MD57bbdbf5f20b751ab159e6347dbb1bfd3
SHA1f37e476b17dd71c8b797d6f0ff0de4f9a42b7951
SHA2567b9ce8596b7b0214a522e3a730de5598a476a58ae6971fd6f23b62792730a442
SHA512c35b24f1f0f7c166b0e6dbea0a1099220761d2f0d89834402e9dbd74f44f6e703332ac28ca805b7b60452bd157a5a241e64672595702132da931de55da673636