Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
ae2c4eca0789c2fa97a30f125abd4565.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ae2c4eca0789c2fa97a30f125abd4565.html
Resource
win10v2004-20240226-en
General
-
Target
ae2c4eca0789c2fa97a30f125abd4565.html
-
Size
61KB
-
MD5
ae2c4eca0789c2fa97a30f125abd4565
-
SHA1
f81766857adba77b6e39070c7e8171470e89b39a
-
SHA256
54e0222368f8547aa207db6ee8c1b19cc87596d692aaea9b8ece91d266ff9938
-
SHA512
757f061aa4ee025507c9f0f2df9da26764f7d6af453ee2c4f563a1b18ad652d184e6f24ea9a2c144392ce60bcdf62e403e31b2e7a3d3688daadafcc514c05a57
-
SSDEEP
1536:KUEBnAMWbwvhCuKl6FGA6V1PamGmwypl6V:KjWbwvhclewV1Zli
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 3624 msedge.exe 3624 msedge.exe 4804 identity_helper.exe 4804 identity_helper.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3624 wrote to memory of 3700 3624 msedge.exe 34 PID 3624 wrote to memory of 3700 3624 msedge.exe 34 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 4812 3624 msedge.exe 92 PID 3624 wrote to memory of 3740 3624 msedge.exe 91 PID 3624 wrote to memory of 3740 3624 msedge.exe 91 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93 PID 3624 wrote to memory of 1580 3624 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ae2c4eca0789c2fa97a30f125abd4565.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff897b846f8,0x7ff897b84708,0x7ff897b847182⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,13686006689579963187,4609833271646197391,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
467B
MD53329f111ae7de622c6b47d595e20d5a8
SHA1c75e07e37aa610a1e3dff6b400c6fa8642d5585b
SHA25688fd2b16ee7adba608d8ae849b3325bd1232ba4ec2af5ee9ef98c3ac304bb440
SHA512e97a82687d95f3a080a449b573ae2daecc064407d37f42245048a6e79cebeda7a1a051b2930120f8aaaec28d4077b5b35ba7b5d1d4d86ef9a24da54022871b74
-
Filesize
6KB
MD5b9b4e07abf9f01733d544256a45646a0
SHA1bdbeeb9d49905f03a586a97f703620cdcfb3110a
SHA256da5d6dd982b5fb3834dc4ec214755ac2a80ac9a2947cf619b5cd51223c6a5c41
SHA51293345cc8bd1231261ffeec305143ebc0186c614f5dbef2492684b0e21d6a9f53a9619d8955b89a539eab314bd1a9d9cb9d1352eb14b3e6506d59452667f5f6b8
-
Filesize
6KB
MD54072601857abe7bc4a1d7f2491087eeb
SHA10f62e2e29cf5d2d227aa53e570f0133ad833de4a
SHA25637c300418fc6fc163863b7d85899461c3de5be1cf884ddb4a84a3899e52183ed
SHA5126314cd277dfa73465b2a360b2a1a75382f8bb925abaf51a6b121360136a7cd3ff4d913bd2ce1cb7b9222ad9a3bb35271a69aaf03679050ac83896c5b9dfd5df4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51a438d0c4c139acb7bcd90f42c231d6c
SHA1be5da3564ada008bc6e88ea1aef6c945f70301af
SHA256ce976c6f747a7def343ec9b20179c8d10687c3cb75fe3339541cb8f37f7dac09
SHA5127e768ee4309c95137fa48236cd4937e88877ee014487073acc58473034814245361d94d9b17bd2d49b8f49cfd45de521cc67abf11d36e63047657cc451be69d7