Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 21:54
Static task
static1
Behavioral task
behavioral1
Sample
a2d436aabc8cbfeef36d293c414eb818.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2d436aabc8cbfeef36d293c414eb818.html
Resource
win10v2004-20240221-en
General
-
Target
a2d436aabc8cbfeef36d293c414eb818.html
-
Size
3.5MB
-
MD5
a2d436aabc8cbfeef36d293c414eb818
-
SHA1
c84fac0fcc20f98c5d0636189b0354c56534fab6
-
SHA256
1f88ed2a893c9c9efc3a2ae1d2827f23ba1df88340190973713aeb2041823bd2
-
SHA512
6e482010ad646b575169f3f98a9c02fccbd047a905d45252ae0f67e94b369fbcf74fbe025a777be1ed150fe3b2e8c2901f8ca7533c8b70a22529baac3155b625
-
SSDEEP
12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nff:ovpjte4tT6Nf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 4592 msedge.exe 4592 msedge.exe 1600 identity_helper.exe 1600 identity_helper.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4592 wrote to memory of 4300 4592 msedge.exe 39 PID 4592 wrote to memory of 4300 4592 msedge.exe 39 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 3376 4592 msedge.exe 90 PID 4592 wrote to memory of 5032 4592 msedge.exe 89 PID 4592 wrote to memory of 5032 4592 msedge.exe 89 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91 PID 4592 wrote to memory of 2712 4592 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a2d436aabc8cbfeef36d293c414eb818.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd7e846f8,0x7ffbd7e84708,0x7ffbd7e847182⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3115669698158237075,10840915689631626820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4db60c9bb06ea5452df26771fa873ac
SHA1c118183a1315a285606f81da05fc19367a2cdfe1
SHA256f168242e74bfde18bacb9e18945a39bb447188eba916c7adf0f342ed8d82281e
SHA512180ed98f9d5a14a22687a099c4a0ba6b586610f7b8b4c8de89f3b91713b07a2ef3726fcd318cb4e270b1745213b898037d29cca4b490d0c91833b797d69ac406
-
Filesize
152B
MD5f5b0bf4edca2187f7715ddd49777a1b2
SHA1eb78099013d0894a11c48d496f48973585f0c7c0
SHA256562016f9159ef363fcbe62ed13ee26052b31d4f67dc5ea6d60864a7d5dfa50a1
SHA5121039b98cffd32ca4c9e37486b96e01b167d76b19dd8440a21da4932d677c463f4c5ce2260239e8337f59bd61ff3111905e23ab71d3ca5b20e7d2935fea7952c9
-
Filesize
981B
MD5331ceecb856df07b7a5a267018dd36a7
SHA1e3adde2820b7e673cb83c39c802386bf7bbfbac0
SHA25684b2092748fc9490272934f5a460e575b260dfefaad1f2fd468af679b75165e9
SHA512e8c6d098faf731cdc478c069156aacf458982845a2206ce722f58191fc0a0f1c73a298737b9d800dc6d95793497d393e1f62b4aa0e645a70a10c2d0cc9027138
-
Filesize
6KB
MD52419e3ced9e4ead874378280dd9e1813
SHA1292e1a656d23497de6c2bcb1c4fa1fa59917ce8f
SHA25687cb6648169a11bf1ecc432ca98c94a77fa8231cc865eb735635dcd32530981c
SHA51200140715064a1f093219b71ec54466a66515f0e9937c761066065faa2d22bc2aacd540b3fb54fd32dae9e1c4a164400f80eaef0ac2de2e34c79a755404fbc276
-
Filesize
6KB
MD5b40ae9cad3bbce4270bd506ea2338254
SHA1cbfdd0f4e441cadc33d568ee76398eb1c35042f2
SHA2560ebb049b804066e8c086b58ab59dc9c341d0d9967cf63f1984e39b4886a7ea26
SHA512433a1b71f00d59c4558a760986f83002a4eea0e9ecbad71559937cb62e84b1a8b90fe9281b8f209acbb20fb803b500626b4a987707371169af68e5aa2c54b06d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56cafb9b86bb57ce55ccea43170cd302e
SHA19a4b0a913d494d5dad4b4e26719585d0819bb5c6
SHA256ff3f1c9c83f33ea8620db8b24318f9f7399a07a6af1ee9dd4faf5354d0b0cd5e
SHA5126e952ebd4cb1fe872b9243278a95c82efe456c77548da2332979f199321443e04b4844f0ac96efa09b40069967b025484d399ba3425dcf8fc7e2489013b9c107