Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
a0c8e86b04ce9cdc220fb496c824a21d.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a0c8e86b04ce9cdc220fb496c824a21d.html
Resource
win10v2004-20240221-en
General
-
Target
a0c8e86b04ce9cdc220fb496c824a21d.html
-
Size
929B
-
MD5
a0c8e86b04ce9cdc220fb496c824a21d
-
SHA1
d24a2c45b8d68cdad0fdf28edeca9cc857246d6b
-
SHA256
d816f1195568efa09bf713a0f53f99f45120fe8a041a25995a61315cab5d04d9
-
SHA512
182902352faead75be2da9688fa2534d3c3e3169a84c0af96ff985cdf0c558fa5b069f625ed496f88c102533955476116477b51df039ad7c0e136696a8280959
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4128 msedge.exe 4128 msedge.exe 3452 identity_helper.exe 3452 identity_helper.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 4120 4128 msedge.exe 86 PID 4128 wrote to memory of 4120 4128 msedge.exe 86 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 2200 4128 msedge.exe 88 PID 4128 wrote to memory of 4008 4128 msedge.exe 87 PID 4128 wrote to memory of 4008 4128 msedge.exe 87 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89 PID 4128 wrote to memory of 3540 4128 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a0c8e86b04ce9cdc220fb496c824a21d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffd2c8c46f8,0x7ffd2c8c4708,0x7ffd2c8c47182⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6775903526803237860,5835290231445283739,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e189354a800c436e6cec7c07e6c0feea
SHA15c84fbda33c9276736ff3cb01d30ff34b032f781
SHA256826adca1e688de79a3ec5b91c75990927fb2a33ae717f474608c68336053f427
SHA512ceb069a5e83a634503e253846fa17b8bf7aaa539c3353ce61251633d69068e24c5eadd1b496f43058790d2b513e65d2c0b0213730813d0b58bb82a00596e05e4
-
Filesize
152B
MD5b9e3e150cfe464e9ebf0a6db1aa5e7a2
SHA13cb184e2781c07ac000661bf82e3857a83601813
SHA2562325a6292907263d1fb089a09f22fbcc6bad56f4961d427efdef1abaef097bcc
SHA512f5eb1e76eb9441cf5000d8d4db9296077b61714ead5012779c084b37f4bba07614055738f5dce69b13b25975d9b7c03eab049b7685eee09b23fd8d4a7d71a039
-
Filesize
6KB
MD5df7a67cfb9fb2c0a1945bfe11fc761db
SHA1ce7d14a90ca5135b9c2caaa9139309b74b70d93c
SHA2561a7dfb9a2bafab809ff4092e74d60303e026852b9b16c97e61bbc26ed2af7f66
SHA5120fefbebf87e1d001bae368e2e510e4ab5cf3f49801230adb1860599d9d5c71286b98174ef106f4c08f5eecb685d60880a65556266e84ab284c1f94939fc019e6
-
Filesize
6KB
MD505629a7eed88394039c40e295ad4fb2b
SHA1ae8adc367568a3d9f25e82c5d3035c1b82d121ea
SHA2569d0e5df4c0bac4ef44b715d062262fa3cf06cee8b34af5f960282fcb0fa730ce
SHA512d76aa0f4cfbb31238495f3338c8e3b7d07d1a9a12a7b32cf8ce7bc97fcdb9c2c319111d2d68049202ddfc61d82eb34821dd3fed31250078e424b859513b35780
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5835a9b045480ae8c070e86f6d32b5180
SHA1270fdbef9cea4ccc1c6e7b6941eb8b935a963634
SHA2561a841ed144878f05c3e9a099bdbbbb2f9caaa8c1e754a9d59ca61b016471f7a6
SHA512e88e82f52b789c1413d4b688d741c37fd509cc7cd6c83a6c775fc71ec1d9eb973de3d85932786a2cf3bea66051fe1871087575e75079ed55862418bf4fde6641