Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
acdcfbaf332829e90b841d3323d0c367.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
acdcfbaf332829e90b841d3323d0c367.html
Resource
win10v2004-20240226-en
General
-
Target
acdcfbaf332829e90b841d3323d0c367.html
-
Size
593KB
-
MD5
acdcfbaf332829e90b841d3323d0c367
-
SHA1
92808a2e07a9fcc49469c359fe77302ed8221792
-
SHA256
16bfc8f65e11faa483a3fe58f3ef201924c1c477633106090937db6cdc938f87
-
SHA512
c9a768ac5ff999e224dc4dfd6da81e1c24892b6323508db56885d88468555247f2cd188d309a5c5c2e0caacf7af4ba1bad6a5cc95615672e9e5a9353ec5202b8
-
SSDEEP
1536:NsPuhuTFpcW/ewuhMOM1bU1sgc0Ksgq7yHShTHuqNlc9Gt54roBhdfFEbSLYgl49:NsPuhuTFpV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 904 msedge.exe 904 msedge.exe 1044 identity_helper.exe 1044 identity_helper.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe 904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 904 wrote to memory of 2972 904 msedge.exe 47 PID 904 wrote to memory of 2972 904 msedge.exe 47 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2140 904 msedge.exe 89 PID 904 wrote to memory of 2920 904 msedge.exe 90 PID 904 wrote to memory of 2920 904 msedge.exe 90 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91 PID 904 wrote to memory of 2004 904 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\acdcfbaf332829e90b841d3323d0c367.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb16a46f8,0x7ffbb16a4708,0x7ffbb16a47182⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6057033246397488293,3757280074458626446,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9ccdaaf0-090c-438d-9afc-8c4a26ee2fd0.tmp
Filesize37B
MD5661760f65468e15dd28c1fd21fb55e6d
SHA1207638003735c9b113b1f47bb043cdcdbf4b0b5f
SHA2560a5f22651f8fe6179e924a10a444b7c394c56e1ed6015d3fc336198252984c0e
SHA5126454c5f69a2d7d7f0df4f066f539561c365bb6b14c466f282a99bf1116b72d757bef0bf03a0e0c68a7538a02a993fc070c52133ca2162c8496017053194f441c
-
Filesize
257B
MD56edca6da5130c768f823ef28a90027d1
SHA170c6026009dfb8a6ed66186cab6537f5b799bf46
SHA256100f6f57c8f5a39979ac120d5d5c56dee06d56a20d7e59e848ca97dc648178d2
SHA512399ac03a157db8117467c7e1204b58f17ca00543824f18f372c8550b8a007e1c17825af2e95e0666f27db25a3c2b842892cf86a711bfc545f6c7b5015999ef03
-
Filesize
6KB
MD59de91d3e65ae21119d57167b0b603c86
SHA1de2a0af6e3b802bd058fae37185112b575af3fb5
SHA256a8134ed7041e97aa6b032c02d7ac2f7942be71b8dd28b72e42fd3315bde04193
SHA512299e9f1fd012fb7afac14ba20f5640c09ff8743a76b40cb826c8b9b6ed7e831590e8bb048feefa164ddb0bdb2ba258040a63aa3c8e3bca174942cf59c70e20de
-
Filesize
6KB
MD546b3f0c1570996364bdcc7fada607162
SHA11415b1b59d29a389a69d34fb9a6ddf09a0f8e111
SHA256167f9bbb1206f1bfb9534cef4d2478137cde14a8b398fc48eb4f566175c8a709
SHA51290467e7ca7dc7e118e3c9e19d233ade9e248626a6f63d2acd5286439475ec3b9b953ab7a269348c203cb1cf2b6e38465d110098cafd08eacb760f8b12fe552f6
-
Filesize
6KB
MD585f7edc4b752f547ced55c5ab0c1dffc
SHA1d09c6bbec87bcb6a965b3c4b733629ecc05a6293
SHA256f5b3575919e495cad2909211d786bcb2515122ce014794a156ed1325b8085fb4
SHA512bfac812a0456d9fa301947ff022f59fd626eabb61a073e69bcb92423bbb4475e1b8e53b72d23c8db29f0fcf41184181fc36510ed8906365e211badb196af727f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f60097f958bcfd4b27ef46c6364c67d5
SHA1edb31cb3516067cacddc8ad7bd966369149b76c9
SHA256dbb8d1f3eaef321da181e7fa182ddd957c0d8fc098df00455954046bf03bda07
SHA5125e14cd865e0d6d217fe16d4a5f2609f700dab93f4b2870113dbf53f376f4860def6ed9da06c1c53cfa4b8b4fb4524c00050744970334e50dfe44b6d8e86d2540