Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
a44695396a7d58110ae5d966e2b2252f.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a44695396a7d58110ae5d966e2b2252f.html
Resource
win10v2004-20240221-en
General
-
Target
a44695396a7d58110ae5d966e2b2252f.html
-
Size
47KB
-
MD5
a44695396a7d58110ae5d966e2b2252f
-
SHA1
47cc22d2c5cc1ef7dc5191ee4aa41b94a65f82c4
-
SHA256
a733e78fc81cce7cae9526c748bc4c2081219ddbc211f668b0805c157d65dd0f
-
SHA512
176c1c03510e449542f0c603a8e40e84ae9e3859dcc11dc3d257dc7c3ef56a8d40260f9e95b343e3955248d9a301e38b37db3e163d3a3ce328b8853dc593fe6f
-
SSDEEP
768:BN2EWQG22HBQAyF2oSwxHBPVQdWaEfxcgknw:B1ZKATSwL9CsxcLw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2704 msedge.exe 2704 msedge.exe 2376 identity_helper.exe 2376 identity_helper.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3412 2704 msedge.exe 56 PID 2704 wrote to memory of 3412 2704 msedge.exe 56 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2348 2704 msedge.exe 87 PID 2704 wrote to memory of 2308 2704 msedge.exe 88 PID 2704 wrote to memory of 2308 2704 msedge.exe 88 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89 PID 2704 wrote to memory of 636 2704 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a44695396a7d58110ae5d966e2b2252f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d3f346f8,0x7ff9d3f34708,0x7ff9d3f347182⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6231031203186979336,15417511080775406906,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\72a50dec-122b-41dc-8202-ae10223cde70.tmp
Filesize6KB
MD5c2e7ff0270a04943d6b329c1e362e25f
SHA1c4012112c770c887e69416fa8be657e938381a0e
SHA256a364572c8dcc7f8212fe1f74d2e19f9fd107b92e55738d7ae77b691a8638f9c3
SHA512f16cc6bb2c2beaabb85b4ec034903e6e0a5cb7f1ea1dcb0529a4f4436f088aaa262df8dda9596f3afe0e44883c842b0e8cdce17394c985d29d534be9cabf4efc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD542811c4d785bc0f731d656dfca452448
SHA1ac8d14a8a999c30a7c577fbaab820c94f5efe57f
SHA2565e70b65e249094f752e0ecc63b6abe78cb341e319236840280614c52466a48dc
SHA51224a48103a190fa333de362b0b815a5bf111b1a64b2a4f64871fdbb305fb5613b43f623da1fb4e738e8a47f31fa944a73e95974e05505934d0060d57c8a755ec7
-
Filesize
928B
MD5e029f9df58b09a7bc7348d19b569ba1d
SHA1eab18682a085b12d062cae5764366271b7ec5c3a
SHA256ad6e89f2cb1d0eee6c20adae931851ba438fbc71731a4dc9636f666095f5ff7b
SHA512187b3123418731adeb8e02e6177e4628853c09d08ef282d2d1dafe9c08e496264571c11cc7f9216b499151c8fc4a2dd1ef1bcda3e3c08465302885406f5ce0d3
-
Filesize
6KB
MD5607fed745fd07dd5fad21a22fae8c16b
SHA135a916f702e7dc3fb62f2fd411d933b81baf76bd
SHA2564d64a657398d118db07568c4895d7cb6600e76218fab15e71363f27789df8e5d
SHA512ea3b7e0c6538e109dc1472bade4f438dfb1f085521a53948d69c79148b5ec99693383e902398f242e970b89dd7f794955ba11aea6decae919592c83aa4d30f39
-
Filesize
6KB
MD5b3df74b88699f0ba9459d726424af535
SHA1ee0091feabddeba295a19c3ee31ed072f2aedcce
SHA25613b0ee50daf9f50d90142db3140a58f937d75833edac60526caf456a68146a1d
SHA512cb6f95ce27978246c7e089cd1f352b2acfbb43b749e30fff5d19ee9b18dc08791e70343b1f718e6ac7a3f1f5ef1e6f6cb6414fb83d146da98861f186f5b20576
-
Filesize
1KB
MD5a810ee903002f282093c441d63feb29d
SHA1eccbe47a73d45ca8a80124d23270ea3d7d799bd8
SHA256d84dfad2f0f0187966e66a45d4c075caaf74b47ae15fe2f057a82262030f6bc7
SHA51251d525e25f381e1c60c45fc34b77b64c6fd66153f7e7576469be09c675ccd1536898d94bc9b85da30d90ac01d53c423081a700e59188270e8b9314cb30597d58
-
Filesize
1KB
MD5672ec710de98b42a90c32d3af84da64c
SHA1bf7bba63340181c8ebb018fa29721069e22e3bbb
SHA2564410f36314ff714b2b1593d0e5dab3ab9f2ff38bb14f2afefb114453d0fe4eba
SHA5125de960a39978fbaedb8641873e48721b0aa3bb69d85ca4a0cfdb3063d308a657346c4e6ceaa8fdfaf178d1a8fa93c4b88ae7799bb5c78e1337c08f618d04cfa1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55150e638837786a080bc7d47812867a5
SHA1021cfbd918ccd2ed96f99b70a0d982423e20e84b
SHA25659fd46624a209a4932cf38e8b96fceba351c208851d8f894eb08cb7ce7d7f0a5
SHA51200324a91c194cfae18c4e6141603197be1810113b31aa08dcfda71eab1349dd385b3398ec4a9d98f70b4e3235de1e94b573f9ca15ea6fdbc2ecf5c7960506c32