Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
ac8963dd4c07de0eb995cf6fd34d7043.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac8963dd4c07de0eb995cf6fd34d7043.html
Resource
win10v2004-20240226-en
General
-
Target
ac8963dd4c07de0eb995cf6fd34d7043.html
-
Size
183KB
-
MD5
ac8963dd4c07de0eb995cf6fd34d7043
-
SHA1
cd6af26fa22c71b7ceaa34422c526680f95da029
-
SHA256
5dbc5749b0f2366d36a86a79d8dc5507a54e5b78ed78a0a19f88bc01833877a7
-
SHA512
9829104a83f437d050887fd5f4d7d8c62b7b0208ae3d40f94277243e1716eebabe79944989774d761cdb801f8d58eaa341af83e68c151f0f07d923c37e8a4c09
-
SSDEEP
1536:7hi9tOI84EhGKG5D87i7U7AOlpONstxva8uyKFcp7jpSsjEC7q/aIT:tlDnhGKGZ8ug1lKFcZpSsjZa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-513485977-2495024337-1260977654-1000\{01D5AAFD-3FD3-4550-8ABD-377B53125B95} msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 2468 msedge.exe 2468 msedge.exe 5076 msedge.exe 5076 msedge.exe 1764 identity_helper.exe 1764 identity_helper.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1056 2468 msedge.exe 40 PID 2468 wrote to memory of 1056 2468 msedge.exe 40 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 1324 2468 msedge.exe 89 PID 2468 wrote to memory of 4980 2468 msedge.exe 90 PID 2468 wrote to memory of 4980 2468 msedge.exe 90 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91 PID 2468 wrote to memory of 4272 2468 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac8963dd4c07de0eb995cf6fd34d7043.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb62046f8,0x7ffcb6204708,0x7ffcb62047182⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4900 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,16478787861314819249,10009197135764029595,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
793B
MD5f039540647e4fb33fd34c2ba1e9c2a99
SHA1c104457f124ccb84b6e3b1deda1aeb13c64f6d19
SHA2563b028fbad4f57a579cec6ea1aad6beb4eb1dc9bf5a0ec835d5feb6dd949f34ee
SHA512e00546acbd1f3a867fa6503a222e661dcb94e63b7e4ad6f79762ef7f1ce6d260d1849cb8f11455ec791dad93e1b1fcdecb5a656a1c991ed81c32e760f40f5e38
-
Filesize
6KB
MD5bfa77476be38b82ca4c483fb4611a7fb
SHA14909d2a015473ea9cac95c067213334ba4439fd8
SHA256375c45bc265b68a5a9d77b01e4edd6189b547945382eed2bbb0b627a280ec63a
SHA512c6eb92de33a3ea870a7a58e889d750b9a08113da45dfd6b4ff93e458ad60a95de1727dc252aeef4df02792ef51fba38157eb693c9c9cb2fc2b1dad53a25861bc
-
Filesize
6KB
MD5909e8ea503f2cfd3af354ac64edd9f94
SHA1310e325b5c2fe4f2c09e9f8c492e9a4cf0639988
SHA25665ea3393903faa594607db95de293331973e1b01d5ab42cdae36bb29b84b8164
SHA512c538ad2aa283d3402d90edec229bdef78358fa7ab90043c2150afda3cc5e7179d21733ef3867887e30cd972dabdf01ebdc732fe2246c8ae1e1bc5389f9595536
-
Filesize
6KB
MD54e0d3600fc56ac197116e4bfbcaf2e1c
SHA14365c58025efe580b72ce1b513051b65e9db0f6b
SHA25677a3729a3845ecb13bae5b41be70969d5c2177d43e2004a93f9dfc0574772820
SHA5126ec00e22a3df18411495682aa82656e5a83660cf658235ed28591084da7e94f0bbe3a700e30c21e4cef95843333b2c1c51fe0a51cacfbf1cd5eed1c4b1c52663
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD599a1b7ad7c9cdc298c370c5d200f38ae
SHA16fc38fc143384c77525e5f5a0b86cbbaa92ed945
SHA25625aa5d72c01cdff7867448514f0210a41776190ddea29909b85fa7facb91f2fb
SHA5129b7856c918a446ae1eeee75d3e739696562026feaf68ded64645db806e20cc723dedc829a3106b0a970c13c564a4b1bd8e8e19bf1d1ced6e99c97e15ec14484c