Analysis
-
max time kernel
112s -
max time network
117s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
verify.html
Resource
win11-20240214-en
General
-
Target
verify.html
-
Size
19KB
-
MD5
79e7e6bad5fc93f6e796b3d8c641c2bb
-
SHA1
4ece6efaa40313795bbea4a10945714585ae2093
-
SHA256
362441ed6d9b3a63faa4f38073f54ae7acf8226cdb8593e328cffcb83e49cf13
-
SHA512
e1d47b916c2730f1131ae77e8a518eba4bfe217ebaf652b505b71d4438920bcfae690f1d60b4cbec6842077e74e54a03db8d637bac4edf90aa9975e6f4383a60
-
SSDEEP
384:5Ssl9qYoJkN0Yy8tCclUaicoroLg8IVVAtqN:BoJkHC5pVrokVDRN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 2664 msedge.exe 2664 msedge.exe 4092 identity_helper.exe 4092 identity_helper.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 3056 2664 msedge.exe 34 PID 2664 wrote to memory of 3056 2664 msedge.exe 34 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 2692 2664 msedge.exe 79 PID 2664 wrote to memory of 4104 2664 msedge.exe 80 PID 2664 wrote to memory of 4104 2664 msedge.exe 80 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81 PID 2664 wrote to memory of 1132 2664 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\verify.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbe4bc3cb8,0x7ffbe4bc3cc8,0x7ffbe4bc3cd82⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,6682946047699225057,11463217800597369327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57d4bdd41d7150644a9fecac756bd5298
SHA1cc6bd77ecef146f18a526ab6a1167649b2bf526d
SHA256ae1f95fd0cac26454941f0578d73b695849ce52ab2ef95eccbb63853cf9103ce
SHA512ba873b94e850c6fa0de096961380265ec833778854612e938ace2c4c1772423793d0d22a585533180328478cc23aef6971be56eee2256405636f80076ed2c796
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD587b7b60cefb14379e1aac5b784118ae6
SHA1bf87c393f5aea13e597f223da3eb63a6757aecf5
SHA2563939331315151945014fc2c5993a8ba0e686a4254b93d8c0df32e5dd7107e6c2
SHA51288665c22a96344fbbad89f8220a9138594cdd0e5f2e0987a496decc66cabe12c6023fc5a3cc17552dd7f5cb6df59132583cac7503a7ea6ea5933370c7303a3c3
-
Filesize
5KB
MD5a165ea42f26eb4560a73077a5cde4e0c
SHA1421ebe74e7de7c03cc6ca2ea920484e6213dc3df
SHA2566223df3e3de7a761952b48d46aa706b10f54faf6f20eb557eb45a6c973ed0c6e
SHA512f6822c9d46f1428a117b81a884e061c12dfdefce5ee737d1ba70c750408683d757511552e4b137ed63588c1495059dfa6975cb698a19ab2e612448c3bd67a8ed
-
Filesize
25KB
MD500042df6368289238bc60caef1baa46d
SHA1981c49ac7b10bd2a9d159daf00844110629837a9
SHA2563ca68414527ece019ac110954726207b8a46bebe6180c2615158f7aebf6e6b1b
SHA5128f549ecc6a1ac0cc153fe39759b8fe093af520dd94e37b8c32e7fc7e87263cc5b2bf404bff31a5960ad9fcf82dabb5a534fa07cc441ce646de2a8b532c28ff51
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f69cf913d655100067592e01fa0eb725
SHA11bf8e38ebb9f3391c2ce94e6371ab8341536942b
SHA2568f2fd0f9e1b27274bdfaba0558b82e78e56be7a09aee462d11dfabb1b9e87cd2
SHA512e5b3fc1242a29579ccaa88317c5ac64de895b345098658371a145459120807c94f52e95554990ace4f622b29b8bddc4383a841c31263f9ce470861032c8f82a1