Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
99104a3a5c279af311f8b3ac0277000a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99104a3a5c279af311f8b3ac0277000a.html
Resource
win10v2004-20231215-en
General
-
Target
99104a3a5c279af311f8b3ac0277000a.html
-
Size
1KB
-
MD5
99104a3a5c279af311f8b3ac0277000a
-
SHA1
dbfba855a7350789ee27d6962be3824991713197
-
SHA256
662a578894e757cdcaff39467630958d8e3a4ceb2a644e9ef52c047a3ddba691
-
SHA512
5e81022a158059336ad99ad4d988df2aafa0ec2f09e9cca50d4ab9a8acebd06747c2bf92c59198e3ac98e91d6e5e0d3cab1c3e9437ac5ccdce40923da9dc45b1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 4736 msedge.exe 4736 msedge.exe 1536 identity_helper.exe 1536 identity_helper.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 916 4736 msedge.exe 31 PID 4736 wrote to memory of 916 4736 msedge.exe 31 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 2980 4736 msedge.exe 85 PID 4736 wrote to memory of 1808 4736 msedge.exe 84 PID 4736 wrote to memory of 1808 4736 msedge.exe 84 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86 PID 4736 wrote to memory of 1372 4736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\99104a3a5c279af311f8b3ac0277000a.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0ea546f8,0x7ffb0ea54708,0x7ffb0ea547182⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2300 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2360 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,8121035916055663330,15662396817807972760,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
Filesize
189B
MD5397f53f29a17baee00697ca31a738b65
SHA1bc300bb2b7797ab6c948a77db2cefad1361d0f7a
SHA2560dba79eb79d62dbf47c0a71d0802e2f473818740fd5869140da4dbfa54582948
SHA512b2857d010ac2c15a16838ff92c50042ebf687e293f05bef559769768fc214032dafa75d0ecb41554122b647294999cbc41cfa3c8e3bf9f5bf8d02a32fc057817
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5661a5615c3dbc7db92faba2e0cb236d4
SHA1cbad575f19f69bec2d833d45a6473b89279997b8
SHA2568f24fc026967a6f5c7f79ab72f0c3fd0d85e596024d66f93d0be517c6bdc252d
SHA51219eecc7624a8ab4456e9613d956cb7498fea63b40135fc4bf579375e10785a589f20c8aabca78d063413136bdcc2d6a74addfd96178b9af7b76532ecb7ed1b58
-
Filesize
5KB
MD505744c30eafd80104f8b274141a10402
SHA1e5661f7dfae091ff00eac0bd90247ff45b87aa79
SHA2562940a7950e636900f36c7e3eb72d3ca5d649ad78e92e7c41878824a440a0566b
SHA512e3cc6983fe543c66e9d42a353459da6fe29cb34fcfe0609f481a07c9db69aed47dd83499c7364858a57ae4f77f89e30da8aad639a30ddae6e5284d26e81fcf03
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56e2ea52858e40e70b52c75fffe9ba21b
SHA187bab97f4999f378a0592d250b134ba8b39e6c49
SHA25651bcb3461a2d4046d10378643eb3f7240cee67dcbfdc5f05e8ca4cbfa6dcb05d
SHA512edf99501f221c13f3e68dfb0fa5511f24ea63c8c2db282add082a4b82762ae0b66905285e42e17b197d3585317840c4ee482e79ab94d13767e5e6c514a9c5f09
-
Filesize
10KB
MD5d95b41bce7d522ce726a3c647fefd05e
SHA1243cc069d54cbe474b9ae073417d13709601721e
SHA256f1f70635fbc937d38f01534502467cc8c43c4c0235164f704f9b26d20e5c6bb8
SHA51207e200b9c6dee582b3a1e2ac5f9a465daab86caf30579d798871de4f45e5791e23635d6356016e3d6381ade74a57373649b67f04a47d92615beeb39d05b30b4d