Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
ac98c23b6f2373a7f79b0d03ea2c3b15.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac98c23b6f2373a7f79b0d03ea2c3b15.html
Resource
win10v2004-20240226-en
General
-
Target
ac98c23b6f2373a7f79b0d03ea2c3b15.html
-
Size
2KB
-
MD5
ac98c23b6f2373a7f79b0d03ea2c3b15
-
SHA1
35920a2f0606a1609f22e27dc8149fd348a44817
-
SHA256
d757bab663de3d033331cd8dd9d8140b5a6761b27671a735dc0ef794f217c792
-
SHA512
58b9dc44fd2639b1ad8df195d2ab310ba588b7ca1df3b290af0f4cec4bf4c8bae630a3177705b22b2ba684be038ac80058b41dc99b151d50847101ff7ba22a6d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 5044 msedge.exe 5044 msedge.exe 3392 identity_helper.exe 3392 identity_helper.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe 1964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 3984 5044 msedge.exe 35 PID 5044 wrote to memory of 3984 5044 msedge.exe 35 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 3960 5044 msedge.exe 91 PID 5044 wrote to memory of 4080 5044 msedge.exe 90 PID 5044 wrote to memory of 4080 5044 msedge.exe 90 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92 PID 5044 wrote to memory of 1012 5044 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac98c23b6f2373a7f79b0d03ea2c3b15.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3c2d46f8,0x7ffe3c2d4708,0x7ffe3c2d47182⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6747100530463636426,10292292378639393522,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD554baa7ccc452379ac705c135dc6171e3
SHA1e21a0ce8eade3a41b57b55cec13a6ad8abfc2a67
SHA256d68ecefc112e7940a2bacd4b78e2b152e79b893497e2ecfe5275063881808f24
SHA5127bfc65081f1c5347e0c1f8eadedc9fb6c5a9a13b68c27753960a95b91e31ab339d444d6dce61d4d544f04e6a248f9e552f8199e4897b2da1fef6ddbe5dacbb62
-
Filesize
6KB
MD52cc4d34491b65ef37fd23c12d5ca4975
SHA1d37677076781f8e70aa51c39ea6f68afce49864c
SHA256191819db6aa673c054eae3fa986bc528d8335e2f3a009f7c6f0790423682bfa2
SHA512448aab866d7bf0964e39df895fd7f4c61ec0d2e4934defa9c41717961e1ec7b9483be465e5c4debfdc0a70a25867487f006cd0e51fb1d14c9a5e7e70a886e94a
-
Filesize
6KB
MD5f6f31228304b1284da940eced195fb9c
SHA1a878f2339b007c62c033230f9cb67662d26f5e43
SHA25682fab2c5ce8d376ea510b3f9fe75c60329c96835f172f6c8171c38b7918a4926
SHA512a659948ccb24dc8eee89d1b324745da1c3c262e2d42f17480b28de543c1874fbcdba5c45df2ee8b93e19fff723b83da9be9def77a3ea33fa5dd4300517328d70
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51decdf2cfb37f68acfafee69a41e01ae
SHA10e585d6311ee460da390504ea7c767d5aa06751f
SHA256dad6e83501d15f4dbbbb8a57d555deef7346ac6079313b05946742f38f09bf09
SHA512520cc591646344b9122fed631b93f4b455e1420395c2018cc154e749b64a105cf6f6b638db46a5e164b57cd2736e69295a888262fc68ffd87e15ff67abb4893f