Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
ade79428cf1b54aa9941f3c7c915916e.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ade79428cf1b54aa9941f3c7c915916e.html
Resource
win10v2004-20240226-en
General
-
Target
ade79428cf1b54aa9941f3c7c915916e.html
-
Size
148KB
-
MD5
ade79428cf1b54aa9941f3c7c915916e
-
SHA1
2296ffa558b43cc10f4adb6deff998c1efce6f2a
-
SHA256
a680a68d4d7664d1c5d40a7f2283b3a45ec15b199446e12bcb321e8ffee78bcd
-
SHA512
f336adc61176f3b1dafd8b6a83534aeb88478df856e8ec47d1b9520d004dcd41caee701d05fb032eda5736110845adabf66141e461e04c082b0efb67bca1223c
-
SSDEEP
1536:MSW8Sg1QQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:hQQyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 2432 msedge.exe 2432 msedge.exe 4752 identity_helper.exe 4752 identity_helper.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 4856 2432 msedge.exe 87 PID 2432 wrote to memory of 4856 2432 msedge.exe 87 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 376 2432 msedge.exe 89 PID 2432 wrote to memory of 1376 2432 msedge.exe 88 PID 2432 wrote to memory of 1376 2432 msedge.exe 88 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90 PID 2432 wrote to memory of 2212 2432 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ade79428cf1b54aa9941f3c7c915916e.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb2a346f8,0x7ffcb2a34708,0x7ffcb2a347182⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11431546633044983832,1949388491658822398,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
6KB
MD5156685c22b56be3e05a196467ab5d0c9
SHA1eff158f7aa0aecf806ce2a650ffccc3b2fc4a356
SHA256ff3aa023398d62023c115d8d120987644f7f747d9822afa812e4d7d77165cf6c
SHA512d9b0bef18f019da2f30aac407fde50ea420075db7d71d21fdb9365cb9a8964f401ff1c4318399e60c2d30bf3d8547a001d8c6d718e36a5ddec492627711bc93c
-
Filesize
6KB
MD554af5ae491b816d745428f59adf6e145
SHA1aa66704c2da25b74dbeef2884e9c21a633e45907
SHA256931baa2921fca8a8098a418ac2a8829faed1c7b84dd8cc3d05e5948405f25f90
SHA5121269ace2280e6d13b9b6be16ce3c4af4b3e4deba00c641a16810c90dc2864829d48fe92677a316f908a47935eff37e97e1e08490c3f3fb63ccaedaeb3eaea72e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f09e9655e08e01541642a8c457e7ee50
SHA15607d7ea1fd745ecb56a99bb899a2da03637afa7
SHA256e2965e44d91ecf485bd750ae300963af1035430a55ba2ff9493cbdc045a1ea3f
SHA5122cf576f055eac6795d9ef74392f679470adcd901483e00a541bb218a8ea9d685a40bf38c8d47ce1b3013d00c64ab2cb08a07048d3b610874fa4e3c0871186b05