Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
ac5646b4759f824863a67d1353b4e911.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac5646b4759f824863a67d1353b4e911.html
Resource
win10v2004-20240226-en
General
-
Target
ac5646b4759f824863a67d1353b4e911.html
-
Size
58KB
-
MD5
ac5646b4759f824863a67d1353b4e911
-
SHA1
080eb7c10c9e422c81c05cd9cfdc8642ece0fa1e
-
SHA256
e3b26737583768e49ddb06f5aed5b6b3d0e991054fad5fa170d91a5394fefd34
-
SHA512
462d9e1f25003c968f39d622ed6f54338654bef1ed2342f1b260c02151d85a5f197d582b2544308622c28eae97a01ddd1622ca291be6918159418d9df11bdbae
-
SSDEEP
1536:gQZBCCOdu0IxCY9a0f0fPfEfvfifsfOfSfEfdfjf9fNf9frfWfNfCfsfwfsfhfFb:gk2w0IxnMnsHqkm6MVLVVFj+lKEYUZNb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2876 msedge.exe 2876 msedge.exe 3256 msedge.exe 3256 msedge.exe 4936 identity_helper.exe 4936 identity_helper.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 968 3256 msedge.exe 43 PID 3256 wrote to memory of 968 3256 msedge.exe 43 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 4468 3256 msedge.exe 90 PID 3256 wrote to memory of 2876 3256 msedge.exe 92 PID 3256 wrote to memory of 2876 3256 msedge.exe 92 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91 PID 3256 wrote to memory of 3408 3256 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac5646b4759f824863a67d1353b4e911.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf62146f8,0x7ffdf6214708,0x7ffdf62147182⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6356 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,1917024136093798104,11092471450004043638,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD55e8acee3707a7a56ae4234f1aef553aa
SHA1c981fabc99fde6bce51dc6ebff7f767d5bd0de33
SHA2569f6a0f326dec23fb37c9416cb0e13e66c543fd4b7b049749497d66107468f75d
SHA512e1878b7e34f038bff1b9374ea3c0a2a00df026393c430f4aed3236dfea65cef934775358a091a7b0ad5780ed1fb9b66cfa63578d0c5045ff8b0cd409952b283d
-
Filesize
1KB
MD51fb15fb4121ec124fb571f29e72a2720
SHA1da8ecf6a1b09bdc7dbced0a8dd09c37e6c4a63b9
SHA256d021151b95a76f5cd4057a1d6cd08085b3f951ab316b22c8f334088d48c1d727
SHA512bcafecf719d8089249161a85ad71e34ca309113cef36e8501c3fbeb4c3639cd91beaf8d738406042b2dd45018efc9ea0768a251a080bd7a0da7cf6833f03b007
-
Filesize
6KB
MD5e4c7218587f5585183f501425ee84eb0
SHA1a4c56aa5e2aec3e4920827dddd51534bff37932a
SHA256c786d31bdf2bf936ff22780ef38469a2ce8e23baf9c28d3d028fc33a3c7bbefb
SHA5126536a3f3de88b7f9892cb5c8a1d0b887101cb419921cf76aabcbe1642b76a952f7e4fd804a806891dd0995c786ef517552bba3027c221a5135182ce20d23db2e
-
Filesize
6KB
MD5277618f85d3df9c2ffce48ee2e4bdfe2
SHA1c82d7709facf5458f162d1861cafa552d76c2648
SHA256ca956412023fc80ae1408ccbd639f0046196cedf08216cd36c9b3ff939b8b5db
SHA5120c05a5c1684f801a9d8e1f6793eef95f2ec63c04d73e1203d7dc69da2d9819e728571b138fbd0ba6409920c2f423abef593f2287ca4959bac07f2432e0aadf02
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59a2146d94079d38406cd46381d75519e
SHA12103d26a4fe83e5cbffb4e5fc01acf326e242d40
SHA256d1106ab5848a563018f60b1b407f206914a69f9af8a462df21762b9f0122d770
SHA512a7533a7f742f82ad76fcab91531a62f143595e1be98d002841e8c2e0104e7b46f003161518b84461cec5e1ecae0f6a9d3927cebd61eeaaf02a237de6033a4e12