Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
aaf6671af0f8a810ba5c1699302ffa48.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aaf6671af0f8a810ba5c1699302ffa48.html
Resource
win10v2004-20240226-en
General
-
Target
aaf6671af0f8a810ba5c1699302ffa48.html
-
Size
20KB
-
MD5
aaf6671af0f8a810ba5c1699302ffa48
-
SHA1
4e7d6a101f535ae03d2d7553fed0ba92853aeffc
-
SHA256
e52c749b3255a23f1aa1fbf80c42ba5b219fd948210b863bbf1ab37ab22a4c4f
-
SHA512
d74e0be9da8afdd1e3b575b6da29676e7e691420b4a422dfec2ca3da8758b52271c871f1530926f774817c155f0b14d9b6dd48855c2516b7dcca1c6f6420aa33
-
SSDEEP
384:8hMlM6dMwi7Y68/EyGyzQfvahqQ9ThwQ91TAyIqp0cYAeGOn:WIM6dMl7UMrxvM9iQ91TAyIqOcg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2248 msedge.exe 2248 msedge.exe 2388 identity_helper.exe 2388 identity_helper.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3928 2248 msedge.exe 40 PID 2248 wrote to memory of 3928 2248 msedge.exe 40 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2692 2248 msedge.exe 90 PID 2248 wrote to memory of 2868 2248 msedge.exe 91 PID 2248 wrote to memory of 2868 2248 msedge.exe 91 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92 PID 2248 wrote to memory of 3092 2248 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aaf6671af0f8a810ba5c1699302ffa48.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff838b946f8,0x7ff838b94708,0x7ff838b947182⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,5477877603384585953,14408426318595728564,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
186B
MD51458754278f7102f93ffac76f859bd46
SHA1281850e622652e26ebafd0fd3afd43aff8d68604
SHA2568799ff47ff6ba85e9758ed3696cb89be62f5907f6bfd6cbd1f65f342c807d498
SHA51261fd0ba23e1a73af1321d1d3175121886b7f0db82776b415aa7968b083f302975eacde41c8ba2f9ae8e83c9d8ef67fdcedf8c4bfbf8932a93027e2b6caa1b296
-
Filesize
6KB
MD596730a40e623956c653bcbd74c164ce2
SHA18895679451964f4e0fbb01cdfca8fa469065f474
SHA25627e6d8c12f10507a6164bd7f3fb9c618e84950c1f42ac17e9e172d8b3d226265
SHA512bfc5fa2f05ea070fc8e09ed57eac9ec7615c9b746ea3bc0f641e58c5b3b8c5b765c26f143ac7fa4b1a3b2e60291ddc369f444e1d8791733de8e9f2e88a6ec84f
-
Filesize
6KB
MD554e5c7ae055cf74cae97334d76bf3701
SHA111e5cdc9b9b00b6b01979be93779504b85635a20
SHA256cbff61578f43295d9e613c8b72365c87caee4eb8ca7468cbf286a8d55e27740e
SHA51243e3752835e3461b465aec392576b571a88354743532a47740fe16cfc647256445c5f94c973347432e303297427473fa77afd0556e7ef6f038bd661b2d658ba1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53e080ea102987ae1a205d8fa1dc3fdf6
SHA1bbd7fadb02928a9787bef47dab13705f4c8033e8
SHA256646a3bbd398a32a4ea26f49b2a2d3a1b511b4f88f9976ea5c190577bd2b60e96
SHA5123856dd509472f092c8213022f906e50c88d784dfd6dad88a741e5466f06864aece7670f0a82364acb5dd9e18a4dcf7e3159e63cc2a26bc94b47e819bcf367af7