Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
a30df9775146931851b9a9451b5563ed.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a30df9775146931851b9a9451b5563ed.html
Resource
win10v2004-20240221-en
General
-
Target
a30df9775146931851b9a9451b5563ed.html
-
Size
624KB
-
MD5
a30df9775146931851b9a9451b5563ed
-
SHA1
ccaacc1ae0bd9d71fd735c174e3f688e71c57491
-
SHA256
a4cf6dcb25bb6e33b6f68de9a99ec8cefbc26d958a3db7b6687148f3536e71b2
-
SHA512
813eebc0d80d46864dc0677ba89684c1438393de358c406ef0b8acc02abfbebac375dacd8113d6ce37d469dbe70cfa1db3ebddec732f1787c5f3d99d96159871
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6N3:jvpjte4tT6h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 5004 msedge.exe 5004 msedge.exe 1876 identity_helper.exe 1876 identity_helper.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2732 5004 msedge.exe 33 PID 5004 wrote to memory of 2732 5004 msedge.exe 33 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 1728 5004 msedge.exe 87 PID 5004 wrote to memory of 3740 5004 msedge.exe 86 PID 5004 wrote to memory of 3740 5004 msedge.exe 86 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88 PID 5004 wrote to memory of 3340 5004 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a30df9775146931851b9a9451b5563ed.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9163646f8,0x7ff916364708,0x7ff9163647182⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,17203551924865973565,1640160223604208108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4464 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD565a51c92c2d26dd2285bfd6ed6d4d196
SHA18b795f63db5306246cc7ae3441c7058a86e4d211
SHA256bb69ea4c761c6299b0abbc78f3728f19b37454a0b4eb607680ed202f29b4bb01
SHA5126156dd7cec9fee04971c9a4c2a5826ba1bb3ef8b6511f1cdf17968c8e5a18bc0135510c2bd05cc26f3e7ae71f6e50400cf7bec536b78d9fa37ede6547cfa17e0
-
Filesize
152B
MD5ce1273b7d5888e76f37ce0c65671804c
SHA1e11b606e9109b3ec15b42cf5ac1a6b9345973818
SHA256eb1ba494db2fa795a4c59a63441bd4306bdb362998f555cadfe6abec5fd18b8c
SHA512899d6735ff5e29a3a9ee7af471a9167967174e022b8b76745ce39d2235f1b59f3aa277cc52af446c16144cce1f6c24f86b039e2ca678a9adac224e4232e23086
-
Filesize
894B
MD5f8c06a4f6c8b8721934ad8f1ca31de40
SHA1a733b40cac14654af3bb948f52d95d7be6954e8b
SHA2567b3a60c7ff2523988596364b14a735e593c2a389e99a93ba8a363b5fc3584049
SHA512dab5550628177f427e3c666e6a27b256d89e1a065f452c463a13f2b69b0762e61e5653ad4f1b68b7b596e03241263987d1b052ac14d9615a1f4629a1f46003bc
-
Filesize
6KB
MD5a9b80b98785a0ef637836ca38c64fd64
SHA1301b1c299bfc5d9155f35242a22733fe04ba63c9
SHA2569238253c45fc064a0a757065cec446b07c85082ec19d8c163f9171871bdd5fe8
SHA512ada70e5e1081e7af43d559fa5be19a19631907ee941cc22be098fa6fd55ee87a074a5436bc07d3f06ebfc0c91541d970921f30e81a819ce6eb094f351efbabb4
-
Filesize
6KB
MD59f53e12dbbad1d48dd97b81cdb0923ef
SHA1f382bfa2e36b0b76df58fcf11f5c2a1e64f6de1f
SHA256c13e8319bc2857bf51c8bdfae408f3301f675317e00d37747991a550955a021a
SHA51259acac8d999fdb478bcc28aebcaba55d54ab5af54725aaf9ffa25a8433c618d9c729c996358d054e7f4fd7ad57e5e88fc0012cecfbae337202b4134e4964c0cc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e48412783f93a637fe6edfaac6db1f1f
SHA14d0860db769bbd9d8506d75c7c3ad2f42f10cbad
SHA256908c202fd15f75f073610aaa846c00e4afd1f9f5fb4a530a925e98f8db7f45bf
SHA512513a23efefd0409102d1acc13349fb5d61634f4706b9d7dc5aec7cb659746407f92286f93f6bb8cd92ad8a5dc2eb9998c7f16732a4ad6495412b7534b22e2ea8