Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 03:00

General

  • Target

    9a95e413b513ada8f8572630e258607a.html

  • Size

    114KB

  • MD5

    9a95e413b513ada8f8572630e258607a

  • SHA1

    c9987bbfda7d19e7a933cfd79a7a258b9cbada5e

  • SHA256

    020ce0ce1637bec6381a0b4c6ec64330832a4f104917815cdb0b98f9a5b666b0

  • SHA512

    5f2b029e81df6b9cefb9d2542a20804855aba0f0c58b1b9d081b6fea9b95acf0bee540de2dd317f1a75a79b4467fe1618ffc90aff9c7c33af1550ee7785389ff

  • SSDEEP

    1536:tdhv0PRsg2o4yUapr9gpSVpEc1t8U9NkIk9jpwo4gRxnCbD:tdWsgjUah9gpSVpEc1t8KNk9ao4MVCbD

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a95e413b513ada8f8572630e258607a.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc07a546f8,0x7ffc07a54708,0x7ffc07a54718
      2⤵
        PID:3432
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,13817365015725207491,2199684068747576231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3216
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13817365015725207491,2199684068747576231,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2
        2⤵
          PID:2568
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,13817365015725207491,2199684068747576231,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8
          2⤵
            PID:3224
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13817365015725207491,2199684068747576231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:1
            2⤵
              PID:4712
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13817365015725207491,2199684068747576231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:1
              2⤵
                PID:1340
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13817365015725207491,2199684068747576231,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 /prefetch:2
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:412
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:1032
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:4220

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  bcaf436ee5fed204f08c14d7517436eb

                  SHA1

                  637817252f1e2ab00275cd5b5a285a22980295ff

                  SHA256

                  de776d807ae7f2e809af69746f85ea99e0771bbdaaed78a764a6035dabe7f120

                  SHA512

                  7e6cf2fdffdcf444f6ef4a50a6f9ef1dfb853301467e3f4784c9ee905c3bf159dc3ee9145d77dbf72637d5b99242525eb951b91c020e5f4e5cfcfd965443258c

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  1KB

                  MD5

                  cb73818852b7b7034f52fecaaef5a150

                  SHA1

                  7114e12f02314d704ce0d1d634b5d6bfe5311c52

                  SHA256

                  1ca6d35791138fa8f8b58449e7c89d265b4fcb96b0cd244126ebd8f552b8ef2c

                  SHA512

                  50104dba57377415c6d16cb702cba370fab5c329d9e4b31cd317696d13ab7038fa9578a8c994be972d598aa579c21faf84173ffcb77fe19b13ac1a3c789cd2ac

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  111B

                  MD5

                  285252a2f6327d41eab203dc2f402c67

                  SHA1

                  acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                  SHA256

                  5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                  SHA512

                  11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  17c474a1d269de188846557f9df4591e

                  SHA1

                  763d35bd3b1159f7cccc050f14dd1067154ec5d1

                  SHA256

                  1e8acf4fb34eccb84d25a9acff9a88c74f268d49020bc82c0dc548fd078140b8

                  SHA512

                  0bf1e9569d702383935b7983d6b96b451a216d94e601500f2549f8d5be47d53552d5d4ca930dced97e02954c7136747b915f5d768d13e27d914be532047401b4

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                  Filesize

                  24KB

                  MD5

                  b0ba6f0eee8f998b4d78bc4934f5fd17

                  SHA1

                  589653d624de363d3e8869c169441b143c1f39ad

                  SHA256

                  4b5ee509e727accbd11493dda2c1d512e7dbfaff66c4f5f7ea9c2d2ccd06151f

                  SHA512

                  e9a165da246c6b80fc38431538203cf03f95794184ff63f00c9500f8919a2028b803f64b670e685185eed72df0509e3185c9b434fdbf2bc7af36021d46bd08d9

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e9b67c12-45d6-4889-b390-a9a880e9d208.tmp

                  Filesize

                  5KB

                  MD5

                  78ceefa452f1802d436251548481d406

                  SHA1

                  816d9f4979be4dfa8d099eae2508b6299a2d3437

                  SHA256

                  14c6b549d6623c3be7cb2bcb12f055b793630c8b04b50b157ffa16743aaf4111

                  SHA512

                  d98f5442009595b60ddaf567de2c7d8337195db1d2eb613111ef60aa704514346dec8d867897024ee209753ab99343f5f33ed91684bccb4500cb94035d5ab1f6

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  417fd39e04528d30d5775f94101113a5

                  SHA1

                  945a83cd1153f9921f9bd1f5390428d430e9b3a9

                  SHA256

                  cc8a3777c7c7bbf8249b61bf4842194bb2bcfc4187d83499cf33772e83c25e82

                  SHA512

                  50c66c21d8d9ca58156d0a3bef2df2aef7289b06f27825e21ec5446827811b49369432340561e37e5b745f6e8643938699da730cb7186b70522cde094ea04ee3