Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
9b790249378be1768e17f8538552b099.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b790249378be1768e17f8538552b099.html
Resource
win10v2004-20231215-en
General
-
Target
9b790249378be1768e17f8538552b099.html
-
Size
23KB
-
MD5
9b790249378be1768e17f8538552b099
-
SHA1
170ef09a32f539c5740e93a2ef4928e3c1d161de
-
SHA256
7aaa0ef6adbc71487da6669be84b85e062cd7e84c3cba3cac61f497ec8579934
-
SHA512
b8ab77790ec43acb28394e070e4c5bf0992b969f7730561465678f0b54a02267af2c571b231f4ce7eda443487fbba2c494ef740d3a53badcaf0c263af79a18a4
-
SSDEEP
384:FnA4ywOGKt6p5j0CztvukeKXXTuFwCzdlrkoqKL24UTpNyOcn8tvG5nTDuU5esT7:t10HtwtWkekeRR9lqKc7wV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4408 msedge.exe 4408 msedge.exe 4572 identity_helper.exe 4572 identity_helper.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 1716 4408 msedge.exe 70 PID 4408 wrote to memory of 1716 4408 msedge.exe 70 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 2352 4408 msedge.exe 86 PID 4408 wrote to memory of 4456 4408 msedge.exe 85 PID 4408 wrote to memory of 4456 4408 msedge.exe 85 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87 PID 4408 wrote to memory of 1968 4408 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9b790249378be1768e17f8538552b099.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70eb46f8,0x7ffd70eb4708,0x7ffd70eb47182⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7857824284024504377,349789787960156771,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
Filesize
185B
MD5dfa0edf62a0e2993e248359176018e41
SHA1d308a7a7aca0c7179a3990d821f02e72c7fcecfa
SHA256dc4ad245ad8f575b2ddab06493e814c1f96c93b86e7b6d38dad66ca6fda76fa0
SHA512419acbc08dc4447e07e2641d078158e6c2b1a052ebeeecc02a4c60d97c60030a0387f5dc13a55d1636b3aa0afd27d1385055d26f87b8cf923534cf500d7a8a71
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD53905d626228bac84cfc2889dafb272df
SHA143e73124b1bd731b522cb62fcd8168ec69e93f55
SHA25654c419829165f42e246cad6efdc2e7bb67279c7e1b60b5674548a2e0e2076aca
SHA512df793b2b5c6ddade68b399a81bdce743a203e68e0f3f732191a0402a57c3a99c12b6065d215ead6fdb64db6d797daa42752285445ca2fd1a9754c0353007f050
-
Filesize
5KB
MD5822fb5aeeb293e9c4f02ea6ff6293b24
SHA12b68f4464321ee805e95f52bec2fe4913c89a6e6
SHA2565e05f596c0c8f1759d4ea2731f76da4f0465e67e67633cdf3b2eaa63d72a9d63
SHA512ff25c0dfd204de963f261029f9c43fd92ad7ba8647d3edbad283a7e4015e2e3d9c7d82d9886bb48530f451cbfc602bf09f1a8c65e284dffccb7f8b97ef13aa72
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD555c751b88aacb5fbbfc6692124c8c70d
SHA1d3591b8f2bc196a1d401509ff3ab80a8a1831353
SHA25626e1a8f1b019174706b4fc5be6b016d437609bd2a9a4f4ca5fb6d556ebd7410b
SHA512e5689dc31e1909409e664b4b911e91aa116e944bf82aef5b2d45bc7461a848db8b3a769524e1666bac555bef91ae984c1d4e52fd1b7dcabf4dbcc19244a79f00