Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
adf8b6d20b1e34eb524a4052d914a4bf.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adf8b6d20b1e34eb524a4052d914a4bf.html
Resource
win10v2004-20240226-en
General
-
Target
adf8b6d20b1e34eb524a4052d914a4bf.html
-
Size
33KB
-
MD5
adf8b6d20b1e34eb524a4052d914a4bf
-
SHA1
2d29023e29aa10339f770ea68e884e3d3a10c6ad
-
SHA256
71e691377f01455bc782d8176b86d8f36e9ada71f7e71ed227005e100bed4064
-
SHA512
c9198449267fecb6cbdc2025f6682bc5b8dee1ca057ee7a3c0a187efb9d58e432e565db47465a867bf8345b7b3bee119ee7c46d2db35cb634d028d442c763d62
-
SSDEEP
768:0NHWsFQBX5x/8yo3WAGbCL3avFoN9kS7UrUAop5EpEzH1NNlXfSlZ2SGCLxgkfmH:0osKqIeeu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2508 msedge.exe 2508 msedge.exe 1632 identity_helper.exe 1632 identity_helper.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2420 2508 msedge.exe 60 PID 2508 wrote to memory of 2420 2508 msedge.exe 60 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2020 2508 msedge.exe 89 PID 2508 wrote to memory of 2124 2508 msedge.exe 88 PID 2508 wrote to memory of 2124 2508 msedge.exe 88 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90 PID 2508 wrote to memory of 4492 2508 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\adf8b6d20b1e34eb524a4052d914a4bf.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd345946f8,0x7ffd34594708,0x7ffd345947182⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9837553448625871720,665943597148697857,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
6KB
MD543cdbf28432695adbba79c527946076f
SHA1a44b741d79e8c59540deef621f82a723117fa03b
SHA2566a9353fdbcd2c70c70984c077530d0d6d5f052e32424ad0115a7219ff8c97897
SHA5127d2142a7d66b11bd20682876c7c228829131cb02b45edf9b462a4f9d720935f1f6ba099ee7bf5f5b444998bfeba30db0e7590beb76ead6bea3157c60eeee4ebd
-
Filesize
6KB
MD5431145c0e3faad1af492718a06080398
SHA17fa2ed6d3f0d475b1578166971243e95d13cef4c
SHA2561959acb6520f0660d3565cb0f5fea8876fd4c4664f18074f74d985954ebabce6
SHA5127f5d203f9064fe4443bf39e6d7c5991dcd79e628275a6245be6050894182b27442fa899d8eecaf1c7fc9540191ae3a11e8754319139247f957927377a3bc5ed5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD525ad743436db8b8aaaa5d0e06443a7c4
SHA17156fdd1e2e234ac2eb20abbf2e40851785b0341
SHA256bc100ff5e3b7f635e61c5d4b110a8f0e9863908cdebbb3284346963ed15fc120
SHA51232be78145877b199a30dd052fc6d1ff341a60cf5ffafbbb01e502e4a1e9e11094f9384e494cdaa2186c11c3c64106ea299140a4dc441e8d92376b5b18e76381d