Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
9b38d9a3b80c21804eb88c412121beed.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9b38d9a3b80c21804eb88c412121beed.html
Resource
win10v2004-20231222-en
General
-
Target
9b38d9a3b80c21804eb88c412121beed.html
-
Size
83KB
-
MD5
9b38d9a3b80c21804eb88c412121beed
-
SHA1
01ba77018ab417f8a26eb3b48661fedfe10ceeeb
-
SHA256
36a51b68ed510a95713f0aeccac1551ab045426b493f16411ebf322c9ed1d9f8
-
SHA512
be7d0984b9a9f165b5fc0fd7e86966cc8052afb4d3139e170fa745e95b1b551ea14df4e61121329ae3ead38a8e86ace45c190d76cdb163bed70652923554b5b8
-
SSDEEP
1536:dzzXirHPbsecoU8oU0X2kP9tnmEPmy7gKmgNqvmuMWrzaGyFMyUfIrPBwMVgqqHn:G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 732 msedge.exe 732 msedge.exe 5076 msedge.exe 5076 msedge.exe 2712 identity_helper.exe 2712 identity_helper.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 2108 5076 msedge.exe 85 PID 5076 wrote to memory of 2108 5076 msedge.exe 85 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 4132 5076 msedge.exe 87 PID 5076 wrote to memory of 732 5076 msedge.exe 86 PID 5076 wrote to memory of 732 5076 msedge.exe 86 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88 PID 5076 wrote to memory of 1180 5076 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9b38d9a3b80c21804eb88c412121beed.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa47146f8,0x7fffa4714708,0x7fffa47147182⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,2208988312657876605,1865415826620757093,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
5KB
MD54390043d569d08cbbe9e7185ef5fdd8a
SHA14c28fcbb0f9be80dfc45786937191b24a2b2f73a
SHA25692cc33c6c2f07460949367d42636270a2291a3c5f8e206f6c674ee848996dbf7
SHA512d5d2bb97791aa7bd9fcc7f8af691c5b86d4bf1cddab4a49e8f056e178c066146e78ad2ebffea3ed634c1c522202881253bee6c9ec6752593b1d225fdc36af672
-
Filesize
5KB
MD5d86ce66c48a08782e23eb85c348c293b
SHA15d3a6d8515bea9393ac9134a6a295d6217154142
SHA2569aec6af9b80af61e53aecca05267e32923bfb0cb84f4c1d94f2149c63435045f
SHA5120e4d771f796d78a821d14facf6f464e2a6a7af9a88e1c75e52a953399d22b68a25f1af6e94dc00b4c16fdf044b993cf89c3c0560d4719160a00d2894ef385cbc
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ed657928295afa6057c81ada2c2fb4b5
SHA1cee7fbaa8ba888f4cb981994424ac5b6b95325ec
SHA256c5308a23d1ceb98e8f7353b02be7d3c3fa12ce50069400e0f78eadd4b333a288
SHA5127ef8aea6e1799040036b3e87c9cc2df1c103c9e5fa5a8c49143e4d001298668f3f2de06e690e7d1a9a865d0a04f268618f2caf752ffa0fee116a1b7d210c3099