Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
2njT8yvRBU7IYilkZNuz94tLzOly47.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2njT8yvRBU7IYilkZNuz94tLzOly47.html
Resource
win10v2004-20240221-en
General
-
Target
2njT8yvRBU7IYilkZNuz94tLzOly47.html
-
Size
130KB
-
MD5
68c53e1560ae1d74696858f5795144ef
-
SHA1
31449163659adc42d1f4b67906516653b343964a
-
SHA256
b0baa49f8a77f0f2671ab9ac172062331e5bfa29886bcc05fc8927de71880ff0
-
SHA512
e7695c794e5051558f61220af97cac2b9bf21c8f610141e588d2aa90e532bb3d812afeb1f8fc685bc258a17b0a1e67a9633a5333068b2f858e44f39b6062efcd
-
SSDEEP
3072:ThwMGHKz/E23MQhm4Ev1oUgAixln1z9J0hB2j:3YCNz/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 216 msedge.exe 216 msedge.exe 4960 identity_helper.exe 4960 identity_helper.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 2024 216 msedge.exe 50 PID 216 wrote to memory of 2024 216 msedge.exe 50 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 3564 216 msedge.exe 91 PID 216 wrote to memory of 1048 216 msedge.exe 90 PID 216 wrote to memory of 1048 216 msedge.exe 90 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92 PID 216 wrote to memory of 4824 216 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2njT8yvRBU7IYilkZNuz94tLzOly47.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadd5846f8,0x7ffadd584708,0x7ffadd5847182⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6364 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7988521922740363210,15650313169224861491,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d62cefeb0c8fbab806b3b96c7b215c16
SHA1dc36684019f7ac8a632f5401cc3bedd482526ed7
SHA256752b0793cf152e9ea51b8a2dc1d7e622c1c1009677d8f29e8b88d3aa9427dd01
SHA5129fc3968fec094be5ca10a0d927cb829f7f8157425946ebd99a346b7e63c977cb3f37560af1a4bc8f87ab19b43b3ed86fd5b37f89d1a9b2dc86e3c73142c3065b
-
Filesize
152B
MD57ee1c6757da82ca0a9ae699227f619bc
SHA172dcf8262c6400dcbb5228afcb36795ae1b8001f
SHA25662320bde5e037d4ac1aa0f5ff0314b661f13bb56c02432814bffb0bd6e34ed31
SHA512dca56a99b7463eddf0af3656a4f7d0177a43116f401a6de9f56e5c40a49676cea5c38b6c458f426c6bff11165eec21104cfa9ca3e38af39d43188b36d3f22a0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52b462e2b67a67278144b2fea13fa817f
SHA12797d19f7a8360351d2b0e28ba1577cf4638b8d5
SHA25690afb96697a3dc3f8f595c6288413c05f42dae6feca32214cb2649b44aba6a19
SHA5124b0969a9232322a0138250159e48cf15d991d13a2f204e9fba14864819f9e03470a9e54c42cc8e7ef28c5b6b4b383d66245e5f010f7fc6ce587765e0eded4158
-
Filesize
1KB
MD55aefc3e07938dea3e7b4ee415b81beba
SHA1a90d8c19594697e6eea58b86c2ab2db7e6a2d4fd
SHA25604d0c10b1361c15a5e6f941285fb77f29c7b4bd1bae36323bc6caf8c494b4684
SHA51290985fac4f9bd8cc15bf0982d4d6ed7e9865d02ca004b57e8cf5c747befd7c48a91bb12f229541ae209a23d290cfd1e90a1719fc20b3dade082fa116817aad59
-
Filesize
6KB
MD5f2e555a50c473a433963c2447db14220
SHA1c24dacd942bf14aa30bdf938bdd5fbb0a5288814
SHA256db1164c7bc111b5f7984cd2de61599714f55bc5993e486cd121ebe7a545c207f
SHA51256bbd562a642b39c70a1c2af22f83e964a2e511bd948e3f3c3866e9a0ed256efeab938ec9e313e5b2ddc09a1debdf953f750df0ec54cdcb2b2efe194dba48425
-
Filesize
6KB
MD5ec2eed4d0747b878c6070683f706e3af
SHA18b9d73a14741ba44e4656ad6a10565d7dd22e66c
SHA25634180e1b4608dc08bbfbf6d03e3abb39f187ded76087022d8eb831dbb76dd66a
SHA512c2706b433c1b75b1c8297f70dfc6c727b85b4b22fd55af20dd08c44aedb38a60efa8a052f83c937bb495d0c2189ff97a17ad42f64e7b2ce357635ff55dc40680
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD538ef0c451bff6ee3de48a35f4c072d6e
SHA155802ce87ffc009d28e355ca04f432d6d6332388
SHA2567ea0143e48423580b1b468a5fbdd8a40c8d614a52213d8591fe7b89bf91c8c1f
SHA512ec6fd6603f1a96726c9f967a53f44cb930bea7a2e052e5b8989475a5fefc66ce244b393441cd974e3fa9d2ac24e22c7ce2a167c9a2fdc7589d9246e90cd2619f