Analysis
-
max time kernel
12s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
3.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3.html
Resource
win10v2004-20240221-en
General
-
Target
3.html
-
Size
37KB
-
MD5
d3b0eaca82863d40692b0f30e36d3908
-
SHA1
76ffb4a75c4fbf754f507a273e1639fa8384a2bf
-
SHA256
74d34924d6ddf29bc8aecf1b2c2a21fcc3c95bd9ab29165f8d8d5b443c433d9d
-
SHA512
86db32f6abcef93bc4b17b0e518b62130b34b8c69b7e3b18d1b519422ab66f0e410b8cafd65bf82307e72dee53901cd8272b952d2c722f64a84621f49ceb80ea
-
SSDEEP
768:hJ2E2ILVpyB58GP2rTzTzTBT/TZT4TNToTJT9TXTeTGTuTv8TKT7T0T4TXjTaTCo:DNvLVpa58GPiPX9LtkhEFZTC6awW/4M8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4504 5012 msedge.exe 54 PID 5012 wrote to memory of 4504 5012 msedge.exe 54 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 636 5012 msedge.exe 86 PID 5012 wrote to memory of 2484 5012 msedge.exe 87 PID 5012 wrote to memory of 2484 5012 msedge.exe 87 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88 PID 5012 wrote to memory of 2800 5012 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82d8c46f8,0x7ff82d8c4708,0x7ff82d8c47182⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:82⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11049185420510324853,14660753198156293071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD558670ac03d80eb4bd1cec7ac5672d2e8
SHA1276295d2f9e58fb0b8ef03bd9567227fb94e03f7
SHA25676e1645d9c4f363b34e554822cfe0d53ff1fce5e994acdf1edeff13ae8df30f8
SHA51299fe23263de36ec0c8b6b3b0205df264250392cc9c0dd8fa28cf954ff39f9541f722f96a84fbc0b4e42cfd042f064525a6be4b220c0180109f8b1d51bbdef8ff
-
Filesize
152B
MD53782686f747f4a85739b170a3898b645
SHA181ae1c4fd3d1fddb50b3773e66439367788c219c
SHA25667ee813be3c6598a8ea02cd5bb5453fc0aa114606e3fc7ad216f205fe46dfc13
SHA51254eb860107637a611150ff18ac57856257bf650f70dce822de234aee644423080b570632208d38e45e2f0d2bf60ca2684d3c3480f9637ea4ad81f2bcfb9f24d5
-
Filesize
6KB
MD5d2ba5de2b64c2f6f1ba0a80c88daaa5a
SHA1bc38ba8904e60a8ee478a1b4bd317b15b66c3c7a
SHA25682ae11985f3b93536421ebcfb22f6cf6aed474efe33cda2a434d85276d2d3f7d
SHA512b987309fa201e5946a44b9a806a0a07b60f364f87f2a777a7e876ca544c89a69f73499b6b742125ccf7cb2b143077f44d95066cd03167cfe2695e4ceff13bbcc
-
Filesize
6KB
MD5704915bd0fb0dee73463c89b9063b8d6
SHA113c44d1d514d4d3f2b6eb027e117e0369cf39598
SHA2569ab7e49b22b913303b7ea4e583428b6a3199cf474ed2bf985af4ff7739877d96
SHA51203490c9b1f5d4d734c201c3305176c628d55eeb32c18f574cfa1c83ba6142bd60361249afd0f4934d959c06f63603f51b16672433a816c999adaa9d1c6c307b2
-
Filesize
11KB
MD58ca7601fd99cf2ec260c65478ce4e8bd
SHA19cef94d06a6a372f2f509d242f4914cec3fa42ed
SHA25691a5782be123c281d8973015008758545a1a10b4d9f4675fbb5d1be5634d71f8
SHA5127375f01d6594928d97b4dc515ff7a673e3483a1696b68384ce5b9292bb13a7bf6034b79c7967d6a489f769b781b45e62ea07e1672eeec92977e2c5760173989a