Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
ab3e87c909ab1e15b38d675bd10483ee.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab3e87c909ab1e15b38d675bd10483ee.html
Resource
win10v2004-20240226-en
General
-
Target
ab3e87c909ab1e15b38d675bd10483ee.html
-
Size
53KB
-
MD5
ab3e87c909ab1e15b38d675bd10483ee
-
SHA1
d22ef2b60696c1b0cd62101fe9a45ec2e7055492
-
SHA256
e3c136d85a27c20701f2ad358c3e93714ae9e59a15b83675a6d44c262e392c3c
-
SHA512
6d3ce27a8a7c93ce41016613f4f9ee51145e214f18296671da05899bc7d6cbf4c4c412ceef027a38c4d5274de7f297d7a290991fe0f2a2e08b89a87dd326fa5a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlYZ63Nj+q5Vy0R0w2AzTICbbkoO/t9M/dNwIUTDmDz:CkgUiIakTqGivi+PyUfrunlYZ63Nj+qP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1516 msedge.exe 1516 msedge.exe 4792 msedge.exe 4792 msedge.exe 3976 identity_helper.exe 3976 identity_helper.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 2428 4792 msedge.exe 26 PID 4792 wrote to memory of 2428 4792 msedge.exe 26 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1460 4792 msedge.exe 88 PID 4792 wrote to memory of 1516 4792 msedge.exe 89 PID 4792 wrote to memory of 1516 4792 msedge.exe 89 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90 PID 4792 wrote to memory of 5096 4792 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ab3e87c909ab1e15b38d675bd10483ee.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff01a446f8,0x7fff01a44708,0x7fff01a447182⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18205913881157541439,2811006695008566865,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
403B
MD5048ee7529ccc9e81a22183e775a1ae99
SHA115377782c705b190692205ed086188afaf6e2054
SHA25643abe5606bae40219b840da02d9fbbf6ea11f7b0d81d1448fa4097bb28cc3830
SHA5129bf4da57d701dc14ebc818ccfdf6b340b691c76bff7bdc3442abc9e1854a67485847bb1a1494bca8a42253051c4bc8a39971ffcde2d3a79de514f8b051a7fffb
-
Filesize
6KB
MD55cd050b47af5f8167c25cb2df154b118
SHA1ebd143ee31d52fde0f02f4ee344cc2968b26dcc6
SHA2564fc09d5df1b4503b09590c91a2cb1806fbc47e7716d38b66d65c86c90fd85164
SHA512d679b7919a9bcfb38593f6968338a4bf30183a83e6e3ae18127f7f53ca37078bb7a3d4d468f359c26262d5fbc09dba27d66dc296820ab438f59613199415bb3a
-
Filesize
6KB
MD573a5f8477bd500252681f0ffd81c2191
SHA1880fe580837851b6b7390bd6be57f67ce9ebf94f
SHA256b522b9f3992591fc2a7b87c3996861b351819b737003dc650d25c7280a20e9a5
SHA512e79ac926a7731237ffc0f74f4641cce84d724e72f25acdcccd74b5c05cfaa2c7c5557274633c9a1a4c9f57ccc3dc3e68a4c1e5b92df7cd4b2efc80aeaf6c5d9b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD568cb625b19bb56d0cd24588f46cac645
SHA109810e1a058625ebfc81bf4a9cb10ac16547e763
SHA25679eb11ec8beaea31704c8a71e3f9223a45b2756854730885adebbe90f80fc080
SHA512dadfd22b38cfc14ff5b318bdbfd42b65ca43dacd050c7c8bdf2aed5e716a5dcb54d4a08b8826a03f805a1a1cfd8cfacb825718ca29a2fb76e1482efd00fdf31b