Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
ae346cafdf5504dfd45673282a7989d8.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae346cafdf5504dfd45673282a7989d8.html
Resource
win10v2004-20240226-en
General
-
Target
ae346cafdf5504dfd45673282a7989d8.html
-
Size
96KB
-
MD5
ae346cafdf5504dfd45673282a7989d8
-
SHA1
4996604d7cd6d37960c790de1ec597460c0d39dc
-
SHA256
d54322340835750ce4ba973a70edc445edf43c205f4528289727426fe89a6add
-
SHA512
8aeac1931012d5253f8013fd2a831e18d81da403cec3aa19a22990b7c6cb5beadddf95f0f059fe6fe4e23b824bfa42091674abbf180d1b45048d4548d267d680
-
SSDEEP
3072:bVWyGJ0namlaVypcsFfas34cHRx324fejS5kx3/:PrF503/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3172 msedge.exe 3172 msedge.exe 3616 identity_helper.exe 3616 identity_helper.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 3208 3172 msedge.exe 56 PID 3172 wrote to memory of 3208 3172 msedge.exe 56 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 2404 3172 msedge.exe 91 PID 3172 wrote to memory of 3964 3172 msedge.exe 92 PID 3172 wrote to memory of 3964 3172 msedge.exe 92 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93 PID 3172 wrote to memory of 3752 3172 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ae346cafdf5504dfd45673282a7989d8.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d0c446f8,0x7ff8d0c44708,0x7ff8d0c447182⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9459581930502315260,236077742316701764,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
1KB
MD56569696cd778c28aa8829656c53d971f
SHA10b43af3b338ab90f9542cfed567c2fc1bd1efa7e
SHA2564505731125a645706a2aaae2c2d14c677ba4359254d769adab2a4544b1448bd3
SHA512d8813adaff709afc6218bf5285cf65f2b5fad1174bfcbe22c9eedd676a40f69f1e63f0982926c624fad6b1070be58d832ed0d0159d60f1319a0ae6b5aea8ff59
-
Filesize
6KB
MD59b0cb0412134d81e8cf248ff970872ed
SHA17e13543a68150e4fd9364e3ac996acdc7994087d
SHA256bdd31b7b67c4e082daf677a275329b84e80ee9bed8164c3979c9543e248f3aa2
SHA5120367934c3a1e9fd9ccbb1583046fdff9273682246820619b19b7675a3b902c3470c7bee3de0d703d6c332267eeff881cb1b2ffb38f3d2aa2163a4f8b60ae2024
-
Filesize
7KB
MD55f9d06c838b4f06d7b749e1f65ddefdf
SHA15bdcf8b2116d6d78b3f6f3d30f4cd0d058b30ff0
SHA2565d62387ee0d43d7f1dec6c5c49d381e20cbebaddfc4990c28beb582e5ee06199
SHA51292345475c92e98438711003807c46c57284172fb58191e1dc23091d2b14b49189d92ceeae41bb7e013ae2655691326cb6e227525fe11f5ea4091fdb3607bd077
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59fdc7f4266e8958083c0916d2446e8b6
SHA16e85897f6a52b3354aff0b2089de63e33b28d5c8
SHA256a103a99e4d72500987d24f2e645e6da2153776a7a9a877c68550dd2dd76c9a1e
SHA512cc061aee2805988de7435b811cbc3480cdd842054efda2f9c489bbdb7b2cc4aeb85256015376f9fa58612e540b643db884d1dd25ba54fb3cdcf330aec23a733a