Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
a2f63a7b1f09c22179c13ac90e6e20fc.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2f63a7b1f09c22179c13ac90e6e20fc.html
Resource
win10v2004-20240221-en
General
-
Target
a2f63a7b1f09c22179c13ac90e6e20fc.html
-
Size
57KB
-
MD5
a2f63a7b1f09c22179c13ac90e6e20fc
-
SHA1
b56d9db5482ecb043e25a176d0f382bd5b5ad4f1
-
SHA256
dc79639d9d382f6b7cc3ba2e2ed6fbd321cff00e2d8e0c2666937b9270086646
-
SHA512
6de87bf1a787d481c238eeac798e78867b47dbb212195a35348ae518aaf7c82778868128861bc7270014b9382b228f6ca95498878493f0c2c7e43590413fd322
-
SSDEEP
1536:ijEQvK8OPHdsgjo2vgyHJv0owbd6zKD6CDK2RVroNVwpDK2RVy:ijnOPHdsD2vgyHJutDK2RVroNVwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 3500 msedge.exe 3500 msedge.exe 992 identity_helper.exe 992 identity_helper.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3500 wrote to memory of 1676 3500 msedge.exe 86 PID 3500 wrote to memory of 1676 3500 msedge.exe 86 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 400 3500 msedge.exe 88 PID 3500 wrote to memory of 2920 3500 msedge.exe 87 PID 3500 wrote to memory of 2920 3500 msedge.exe 87 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89 PID 3500 wrote to memory of 244 3500 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a2f63a7b1f09c22179c13ac90e6e20fc.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffce9a146f8,0x7ffce9a14708,0x7ffce9a147182⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3139068380401829414,3577152388701953615,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5dc0d8ca441187494bda44b86f82eb6a0
SHA16ccf02dc150eb5be84a04af24e702d17589e26c3
SHA256b0607e7bcf7ff6a2aa83bed9c731628a4a297a7fda1caaf67c0ca18a184f7e65
SHA51294aaa4b5312ce7dbfd106b3b0facf4ec53ba0c29a35242389e1ad061713f5cbc86e85b945029a2ed27d57959a19707f94d2125d643a6db35a6011f1242070244
-
Filesize
1KB
MD55b36a4a72b5e2a39bf23f6f443d8479a
SHA13d9018418e716714c0f39b656402be4a1da418c8
SHA256e0459941678542922cf95942cdac1296a669f711ceb0a5c937ea834c12e9bba5
SHA5122b8275c925a22eb8b3e01273217d90f5fffe40f8eada4f107e179ed9b670b95f2db60363a2e174d8d4dd5dd77ac4bbaac0b2fe7d1a9e1a09c71cdc97fa541172
-
Filesize
6KB
MD526b845e0a3327a508d5b9e3db1cfedab
SHA1a8cf6fc4f8769f302c30355b5183cbd3340616bd
SHA25608ef1a4399558b00c7d5ced7908b88893b82973041bd40d819ddc1de4343c519
SHA51261746d02492a25cb4a9e52490f6e7d767eec218e335f3aeb333ce859c1e79fada9cc3f2af5aec90da04b036c948c83cc26b6f93eef21b37730208c6c5f3358e9
-
Filesize
7KB
MD598af8bbd1ae3f03f13f90211bc25020d
SHA15e3dbe44b2462e712fc6c08cc99cc26741a332c8
SHA256263462e89b0ba04c850a79e43b37a216efdaca666e5e67057694fb3a50a664de
SHA5126eca48116cb5b0005600b41e0c5d1dac622a7bd52c8ca9ee2b6d2871b39dbedc527f0fdddaf2c7be96313922b5bff6157602fed3b1b4525b76c3923fac55477a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a25567be26ecaad8f6e87893f139f4d7
SHA18742c0fd59cf27e32a2058561ce7c4df27c6f92b
SHA2567cb836481a3d103f56a1bf67ebf641ea2e64fa1cd1c1ba5ebb21188e236cef32
SHA51218df172086383af0f0134eac47b9502451aa3e5abac254af159ec1f5bba25861aaf129241125e706aacebc92bacb61b3387557733282c26f49b81135dfd0fbb2