Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
ad36f859ac3112c2149a46da9898e3d1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad36f859ac3112c2149a46da9898e3d1.html
Resource
win10v2004-20240226-en
General
-
Target
ad36f859ac3112c2149a46da9898e3d1.html
-
Size
10KB
-
MD5
ad36f859ac3112c2149a46da9898e3d1
-
SHA1
e1be97b4843fa32f518203f3904ae331c045d328
-
SHA256
6711bd6dc6bbb856fae4e662cb0fc7cfcc8f0a75566d640b1a11b7265771a6b5
-
SHA512
c84137ae9ab73c895697e5ae33ee0ca028f329a51f1e4c7d5ad37f5bc02f17b0e35d4c17c9de5a62c8ff8465f0f32b44e10d9700e7ba3d14f36796553cbd7537
-
SSDEEP
192:P3/WrmrrW74jQYR0KwUOwm1ay6ZkVikC9bezeuYes8uaPPf/TU:/A6rCoRrOwmAy6eZPKuRsPaPPf/TU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 4124 msedge.exe 4124 msedge.exe 904 identity_helper.exe 904 identity_helper.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4516 4124 msedge.exe 41 PID 4124 wrote to memory of 4516 4124 msedge.exe 41 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 3624 4124 msedge.exe 92 PID 4124 wrote to memory of 1968 4124 msedge.exe 91 PID 4124 wrote to memory of 1968 4124 msedge.exe 91 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93 PID 4124 wrote to memory of 1096 4124 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad36f859ac3112c2149a46da9898e3d1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5cf146f8,0x7ffa5cf14708,0x7ffa5cf147182⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12583193518414760464,1377522828876857927,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
184B
MD536bfc73c39b54be00e8058bc99dfdcbe
SHA157d978fbcb3992c6e0584d132d804cf8286d4864
SHA256f1dbdc6d8d0e72f68354159b1749e016cb11f1c2e5d5cac64f996ccfe135d1b3
SHA512f4a26443bd060c27f6fc7f4d3f8ab3cc7026bcfbca463f16576449376ef1e70c1776e60460b7f1b0442a1212fa336bdb818c892cfdf9a2f56172bc8962c609c9
-
Filesize
6KB
MD517375363de3de365464ad3f7f33cedcb
SHA126b55adb0ba9395b50acec9fd8fcf9e58bae835e
SHA2565b4a5ac11f5bde923c75137cfd6f89d8aaea5843c9acb46be50eb5717dc49c1f
SHA512a03341d4f27c03cfbcc290cb0626bca3446bcf0fcb5ed01aa01f48b864ea01b70ff8a491548e7ebf6410aff94e5e77ad09b6f84784f35a4f19082f8f7c23b99e
-
Filesize
6KB
MD5b9e06babd9de90291ba1638490cecebe
SHA18e7564d24917f32f879e59062d84dc912c584504
SHA256ab7deecf7515daa7493ed76b3b7c7ebf2a4830fa63ba93cc647ee67936664c6f
SHA51218076796a5c2fc56630ea550b40bc0a0889af1e6643f7626c1cbe3e5f8d3f8eafc6cad5fed67b319630a5a5f2d4b105f2233516025a33c0e14cee4f5b1455167
-
Filesize
6KB
MD51542df1db52367fe964b6b2b0b565f4d
SHA18d5d4d21d4e7e244844f4e6f7f906da9ceaa03ca
SHA2560e6995e7972c423b3dbef682ada099aaa5c57b7a93018416e371f40a4cf42859
SHA5123f3833c27bdc1955c020bd72688e9319939b93a754219d00204a3a70f429f1d1147dd783ee30ec395fcd2d70b200e3a66065d54a2c9691563e8835bb6280580f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f7d2c930636e4839e8f7df4d2f05e813
SHA118cf023ee2b8e73be4167755f66aa2dc7bea22a4
SHA2560491bca68998899fec25c630773fa2f4dbe562f4b43ecc7602187c140ad17c0a
SHA5126fb35c72479a892243d473df8fcb7c303e8e9c237ff5ef6cfd4e702a3deea30ce08ca88b7987fedc508b9f6bfaa5f8253ab417ff0cab59bd1d23b4b18e33eb80