Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
a44e06888ea4669b11739291747f7b57.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a44e06888ea4669b11739291747f7b57.html
Resource
win10v2004-20240221-en
General
-
Target
a44e06888ea4669b11739291747f7b57.html
-
Size
62KB
-
MD5
a44e06888ea4669b11739291747f7b57
-
SHA1
1546afed172a88be9e5900b5fa93a264de729d1e
-
SHA256
03c54a962f7aedadf608a73ac32727f1a3004f269d3a11911492ff7f80c8d6fa
-
SHA512
4f3fb12f7777fefe0c96d3ecfb4b1baf96ea59e78e4086d3f40472fcf5b634fcac069bd67d5355eab92dfa8d4ec067165364517cd0c8527e15d18d5a2e3afa9e
-
SSDEEP
1536:rIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7Sx13K:213U1Oh5R4Ae
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 224 msedge.exe 224 msedge.exe 2124 msedge.exe 2124 msedge.exe 1484 identity_helper.exe 1484 identity_helper.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3660 2124 msedge.exe 27 PID 2124 wrote to memory of 3660 2124 msedge.exe 27 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 3536 2124 msedge.exe 89 PID 2124 wrote to memory of 224 2124 msedge.exe 88 PID 2124 wrote to memory of 224 2124 msedge.exe 88 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87 PID 2124 wrote to memory of 4324 2124 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a44e06888ea4669b11739291747f7b57.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb041546f8,0x7ffb04154708,0x7ffb041547182⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12551896501871149926,13989825044157557726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
Filesize
688B
MD59a275c10c81c71a85298fde0b4ec82b0
SHA11cea2c7a7cfb2bec45dad50ecf730fe32c10740c
SHA2564542180089b5e56baad9d2a9d39bce522d030fe63f18b2e0bc33353027effa6e
SHA512c5350be33b233508e3a60b7c1efe6b7b298fec1ceff9fe4737de5ec159c22c8fc851dc2deff7fcc148ba996a674f378699874c2c8a9b5dc6d594838e2ab48750
-
Filesize
6KB
MD5e46831ebabf4516e654f661703114800
SHA1a1dba90393676b02947dd84d5fcdc23f41a760ab
SHA256f88f87c032741993b2536f560a11ce561723c3e0aac5ebea2dc2fad6899a9ae2
SHA512e8b6f0f36fba2b2a27ac520a8a004ed1fc37ac7914ec41bae6c82281de71e22eeed8bd3036b2b92718edb10c51790362b966a3f16d3c0b782c6ca24f4957eec8
-
Filesize
6KB
MD5434b800aee8694262542325b79f76f02
SHA182184203449041a3d4a6e672deb89c4e861a8bfe
SHA25616ec9c60b4eee494f671864fab7ef86dfbb12be4d7c430d81698e4c537c6b718
SHA5122850be8084157e10ec78d8cabe320e97636a485e07b9a41af5401a4d25118b597c920a9f1d7a4cab1851d08505a7d60e86bd26284374114e0604ea8d2587b6f4
-
Filesize
6KB
MD5ef92c8a61f051061db7bf614a7ee5c4a
SHA169146d6eec0767d62d0e7ce30a3e0020f146520e
SHA2565fd9d1479fec727a0fe8e8bf83738e9fb5c314f68ff6ced26d6fdfc5d44c8074
SHA51282b447029b5c36799b1ac126c341189add85a1e7bcb48b32f40689dd1eaf41106bdec0a191ac20f3a618a588fe819995da75a326299ad6a8db79ac0bc6de21e4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD558bf1be42227ddc607b1345b45990614
SHA1984640ff12a869099851f65b0e58d17b43f341e1
SHA256e9b4a7fc322249736a5acaadd01f66836ea61d20b9894fea332ff9ebe59dc32d
SHA512883e7374423fa1d496dc5cdb80b2e1eec22d5720cc7252e26cd3b369190b719bd445d41f7ccbce5416ae173b58ab6cf3470aedf6e656a4825ea53e87a926ffa9