Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
top.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
top.html
Resource
win10v2004-20240220-en
General
-
Target
top.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5052 msedge.exe 5052 msedge.exe 4908 msedge.exe 4908 msedge.exe 2072 identity_helper.exe 2072 identity_helper.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4908 wrote to memory of 1928 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1928 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4288 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 5052 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 5052 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 4780 4908 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\top.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedbfa46f8,0x7ffedbfa4708,0x7ffedbfa47182⤵PID:1928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1284
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:1916
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:1276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:5068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8891826873432486002,50307077660040777,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53300b8028991d6e234684db7803b66f9
SHA196df26150566233e1e0201bf17b4ea896861862e
SHA2565b7786b5ae4ba62b88bdbd0992a8fd96b37e4c7068e2fd23d0b33acf769d00cc
SHA5122f2dff4c24d4fd60160f70d544059bf02eca983309ff46bb7a1cb4d7c413e291c1520842e1922be55a4058380cd041cb6b4d9e70cdc5e4e00880fe13472df031
-
Filesize
152B
MD5a7f6a4b84d93993fde98d6553834416b
SHA14b4a227af10826f5a2f2e9b232ddb0336b3066f1
SHA256843a9671b3fab9337d8d600e170f9ac8b200a2faf63b5a8cd16f157bcf73c21d
SHA512ccfe39c47109dbf71c74ff6950526be7fcd521462f80e69e27388a9757d7f1adebf5f723c46b1631ffe3e2b4aa5829655d556bff8bd7e0f9f87fca46545bfb97
-
Filesize
6KB
MD5e3df0b7daa2bf50c783c9fe78539b71e
SHA198dd8835dff620b5a76d8990b00159d6399ca016
SHA25685ea47069e36568b1cfcfb5723f30b705f54bc9e039c6849d10669849c81340d
SHA512729c9f939b30da4c044e561dd48e44155d0cfee5b0f0da8b3a98df118613863d510fb1d5133153910b640a0e10124807b53d7600c9030e02ae80d81a888630c8
-
Filesize
6KB
MD5e5d4316d711d526091ca201432e02deb
SHA1b1328cf6239bc19cf19853133b3190958bc77fe4
SHA256459ff3a6a443921d51ff6dd7a4e0a86bb9bda0ec06a52bb9bc1e4103106d6dfb
SHA5129ffb09a3d2ccc60f99d9389105a9c8bac98d2775787b8fd20a3f536863326c5febb83180c538425665247412865011572798d1c789fe557398844362f8159008
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD573af3b5902c86d914fe2b2d14279e659
SHA18351db8b18f3d681f408a677c3373fd0245c97c4
SHA25659d3587eae69d3f1707fc633d0673570235c0925cf102eb99a14301b6458c08b
SHA51264de5f21f63883bc1f1b1ed2031d67d9562bfc83834e946ca7a34e7e37be3f422caf94e93a85172b23ee61c0bc5d76caab5da572a847891d3f6d60702b1d43ad
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e