Analysis

  • max time kernel
    12s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2024, 12:18

General

  • Target

    3.html

  • Size

    37KB

  • MD5

    d3b0eaca82863d40692b0f30e36d3908

  • SHA1

    76ffb4a75c4fbf754f507a273e1639fa8384a2bf

  • SHA256

    74d34924d6ddf29bc8aecf1b2c2a21fcc3c95bd9ab29165f8d8d5b443c433d9d

  • SHA512

    86db32f6abcef93bc4b17b0e518b62130b34b8c69b7e3b18d1b519422ab66f0e410b8cafd65bf82307e72dee53901cd8272b952d2c722f64a84621f49ceb80ea

  • SSDEEP

    768:hJ2E2ILVpyB58GP2rTzTzTBT/TZT4TNToTJT9TXTeTGTuTv8TKT7T0T4TXjTaTCo:DNvLVpa58GPiPX9LtkhEFZTC6awW/4M8

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82d8c46f8,0x7ff82d8c4708,0x7ff82d8c4718
      2⤵
        PID:4504
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
        2⤵
          PID:636
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2484
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:8
          2⤵
            PID:2800
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
            2⤵
              PID:4724
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
              2⤵
                PID:4492
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:404
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2792

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  58670ac03d80eb4bd1cec7ac5672d2e8

                  SHA1

                  276295d2f9e58fb0b8ef03bd9567227fb94e03f7

                  SHA256

                  76e1645d9c4f363b34e554822cfe0d53ff1fce5e994acdf1edeff13ae8df30f8

                  SHA512

                  99fe23263de36ec0c8b6b3b0205df264250392cc9c0dd8fa28cf954ff39f9541f722f96a84fbc0b4e42cfd042f064525a6be4b220c0180109f8b1d51bbdef8ff

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  3782686f747f4a85739b170a3898b645

                  SHA1

                  81ae1c4fd3d1fddb50b3773e66439367788c219c

                  SHA256

                  67ee813be3c6598a8ea02cd5bb5453fc0aa114606e3fc7ad216f205fe46dfc13

                  SHA512

                  54eb860107637a611150ff18ac57856257bf650f70dce822de234aee644423080b570632208d38e45e2f0d2bf60ca2684d3c3480f9637ea4ad81f2bcfb9f24d5

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  d2ba5de2b64c2f6f1ba0a80c88daaa5a

                  SHA1

                  bc38ba8904e60a8ee478a1b4bd317b15b66c3c7a

                  SHA256

                  82ae11985f3b93536421ebcfb22f6cf6aed474efe33cda2a434d85276d2d3f7d

                  SHA512

                  b987309fa201e5946a44b9a806a0a07b60f364f87f2a777a7e876ca544c89a69f73499b6b742125ccf7cb2b143077f44d95066cd03167cfe2695e4ceff13bbcc

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  704915bd0fb0dee73463c89b9063b8d6

                  SHA1

                  13c44d1d514d4d3f2b6eb027e117e0369cf39598

                  SHA256

                  9ab7e49b22b913303b7ea4e583428b6a3199cf474ed2bf985af4ff7739877d96

                  SHA512

                  03490c9b1f5d4d734c201c3305176c628d55eeb32c18f574cfa1c83ba6142bd60361249afd0f4934d959c06f63603f51b16672433a816c999adaa9d1c6c307b2

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  11KB

                  MD5

                  8ca7601fd99cf2ec260c65478ce4e8bd

                  SHA1

                  9cef94d06a6a372f2f509d242f4914cec3fa42ed

                  SHA256

                  91a5782be123c281d8973015008758545a1a10b4d9f4675fbb5d1be5634d71f8

                  SHA512

                  7375f01d6594928d97b4dc515ff7a673e3483a1696b68384ce5b9292bb13a7bf6034b79c7967d6a489f769b781b45e62ea07e1672eeec92977e2c5760173989a