Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
a14399b7c185b822c97f64b428ecb4a8.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a14399b7c185b822c97f64b428ecb4a8.html
Resource
win10v2004-20240221-en
General
-
Target
a14399b7c185b822c97f64b428ecb4a8.html
-
Size
4KB
-
MD5
a14399b7c185b822c97f64b428ecb4a8
-
SHA1
b6472f222e52bbd3992186425c961138755c4d86
-
SHA256
bdc2428de67d013c20ddb5c4cf2029ec9be42c71abace614dac9613db86a2f07
-
SHA512
e83ab4fa7a88b73ed1d6aa2d294a45d811dd3c6edcb25aaec86636006a99571554da2399f2d9298a059a8b23456e9a7298cfcf8501e9172bc1ba29d0ade3dbbb
-
SSDEEP
96:JbH5zFZ883QiLNRqE6RYqlc3wf5m0bxLMC9FXrUl:NHNF2mQiLNRkhFFLY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 4380 msedge.exe 4380 msedge.exe 3068 identity_helper.exe 3068 identity_helper.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 636 4380 msedge.exe 83 PID 4380 wrote to memory of 636 4380 msedge.exe 83 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 532 4380 msedge.exe 89 PID 4380 wrote to memory of 3840 4380 msedge.exe 88 PID 4380 wrote to memory of 3840 4380 msedge.exe 88 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90 PID 4380 wrote to memory of 3784 4380 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a14399b7c185b822c97f64b428ecb4a8.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9b6646f8,0x7ffb9b664708,0x7ffb9b6647182⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,18167489420405104429,256895143767773316,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d62cefeb0c8fbab806b3b96c7b215c16
SHA1dc36684019f7ac8a632f5401cc3bedd482526ed7
SHA256752b0793cf152e9ea51b8a2dc1d7e622c1c1009677d8f29e8b88d3aa9427dd01
SHA5129fc3968fec094be5ca10a0d927cb829f7f8157425946ebd99a346b7e63c977cb3f37560af1a4bc8f87ab19b43b3ed86fd5b37f89d1a9b2dc86e3c73142c3065b
-
Filesize
152B
MD57ee1c6757da82ca0a9ae699227f619bc
SHA172dcf8262c6400dcbb5228afcb36795ae1b8001f
SHA25662320bde5e037d4ac1aa0f5ff0314b661f13bb56c02432814bffb0bd6e34ed31
SHA512dca56a99b7463eddf0af3656a4f7d0177a43116f401a6de9f56e5c40a49676cea5c38b6c458f426c6bff11165eec21104cfa9ca3e38af39d43188b36d3f22a0f
-
Filesize
6KB
MD546b09f802f7690f0d64ad72223b55fba
SHA1f9ff80b247c381533a23bad2a2c7888484971d01
SHA25631d74a113ee718b3c4ae9803daa0e578184696c9f3c8a6b18bafc4d28cb863e3
SHA512bdfb333f463278b987fc1c3f56e6ca8859737c57c9aee6fdf46863be41070768816542913482f3a29fa01170923cac06ce18200df01e2f10e0439c356479db00
-
Filesize
6KB
MD5713bca5da081ec691ee27aaae9d27842
SHA11b78dd1d0a6e79586bd680f405bd0b88e91f8474
SHA256c048e1e35f72f1f3a6c4c7ba2b127eb0a71cd61064e801259da1f8a11702bf49
SHA5121b3eae540e3f6c29dc3b39cd7a2bceaecbe9b8d88a7b5685d0c8152077cb4cf393f18c88a10a9f3bad3e66170e1374a828ad8b9d48b2996261da5397273f2513
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58a38ee43f27ea90cf15624b93b93711b
SHA12dff78933f8b3a48acf90a8d4c7b39a3fcdc4568
SHA2568743d25cbd573e815ac4dcfca5562a196bcf4e50c842fc0f9bb82d33d7829cf6
SHA512848697ebe682ecf129209239203641523b256e4469c85609d3536fdd4e9b293842faf3f462262240fc333ce8902141f517e5f6dba02c32b092940823102a13df