Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
ab4d0247aa20bea26b27ce6936e1cbe9.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab4d0247aa20bea26b27ce6936e1cbe9.html
Resource
win10v2004-20240226-en
General
-
Target
ab4d0247aa20bea26b27ce6936e1cbe9.html
-
Size
44KB
-
MD5
ab4d0247aa20bea26b27ce6936e1cbe9
-
SHA1
0c1f4d478f0031a8c801842a72861c193e28f0d9
-
SHA256
dad884c4c294af83bcf548645afdf6de3a9a3cdbfa9541ee5de8db92d27d4da8
-
SHA512
122c7e1971e279aa80bbca56e2a76139905e6405f29152faee4f61d08e9a6ed7e356689b88ac5e2ac4a74da54292832a6cc983e899faac3a18714695cc109d1a
-
SSDEEP
768:mwS0l/sGVLsk8ejW4mTNn2oRDelg/n7ZwYl5k:mZJtjDelg/I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 5088 msedge.exe 5088 msedge.exe 4252 identity_helper.exe 4252 identity_helper.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3796 5088 msedge.exe 62 PID 5088 wrote to memory of 3796 5088 msedge.exe 62 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 4208 5088 msedge.exe 87 PID 5088 wrote to memory of 1920 5088 msedge.exe 86 PID 5088 wrote to memory of 1920 5088 msedge.exe 86 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88 PID 5088 wrote to memory of 2516 5088 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ab4d0247aa20bea26b27ce6936e1cbe9.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9442d46f8,0x7ff9442d4708,0x7ff9442d47182⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,5402137539455278575,5770008687819685560,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1404 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
6KB
MD54c8ab495388dfd73fa94014e9966761b
SHA13e2c0e509eaa24183e492e5c1889f1b18a4bf77d
SHA2568c718d71e367bfc9e2e1633e64ff17f54a8929234da77baf048f6e69e73f3990
SHA512a2aa2e72e69bfd733ffa262d9e61dea1796a934f756d21f3b10d1fdad9ea04717204c1520e4c4e69e2491adbbff8b29f8d8472efcc177a6bbdaf658afb779a62
-
Filesize
6KB
MD559c97982b04609d6360cb7a6ef316a38
SHA18fa853e8eb2e1f8a01747d004bad71b1485cdc0f
SHA256a5f21005e4db0a37501c6ebb6d53785d30a98aa0ab0b0c74dfba33b1fb5ce755
SHA51204aeef9ccd999a886a954f7ec9872dea5e66f2cb5a1c4b15119ec8d512512760bf6cab020344f4d2031c02200d167af570356aa93bb3d7f9727cc0194ab98efe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53b468ecf9810ec77a9bdd12d7ba7ec30
SHA17151c36b6df3a462ee01d6f7e6eeec3e1a5a76d2
SHA25676d5f2a01e88ef1105043063022110582db49f445da2be2d721b4fa4d6b91264
SHA51218a16009cd37b8de280044d351832d277a3f2938ebfce33aa0febd5c74faf3bbc9ebd86383ba40cdd4c7ffd8198111327ad1519369011192558eb35bdf0d8fa6