Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
b49235266804e323fc163e3d4f52598e.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b49235266804e323fc163e3d4f52598e.html
Resource
win10v2004-20240226-en
General
-
Target
b49235266804e323fc163e3d4f52598e.html
-
Size
2KB
-
MD5
b49235266804e323fc163e3d4f52598e
-
SHA1
0c886e8f014988d3737da3cf7d0c806815990293
-
SHA256
1361f8ab93ccfce82c18a89e1115c56f20a5d84cd17c736db9696a2ffd469e2c
-
SHA512
2638195050f77420fa975168efdd1958a00e19c10073fb00f385bca9160ba9d01ea86c8a5d9c7f0da3c8cbaed1a6935e7e88e1d5e18c419b818584754edf7b2f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 864 msedge.exe 864 msedge.exe 4660 identity_helper.exe 4660 identity_helper.exe 5560 msedge.exe 5560 msedge.exe 5560 msedge.exe 5560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 1072 864 msedge.exe 88 PID 864 wrote to memory of 1072 864 msedge.exe 88 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2264 864 msedge.exe 89 PID 864 wrote to memory of 2160 864 msedge.exe 90 PID 864 wrote to memory of 2160 864 msedge.exe 90 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91 PID 864 wrote to memory of 3256 864 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b49235266804e323fc163e3d4f52598e.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5ab146f8,0x7ffc5ab14708,0x7ffc5ab147182⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13240581443848240811,8178102797360775620,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
467B
MD52a7942b0d9e2fa59bc92b0ac231d8362
SHA16851295dbf6e2d25ebd1233e82154c276a85991f
SHA2569cfd0f85d5abdb55e2789a9e0dcff4f64264a4de3af53f58a1994ecef3f672b6
SHA5127d2be8deb6b5c312a7083e0183711e2afa799e395418d7f8ad0553a5185019429668e19d9fdf51fb3cff4a4c708367a45d62c3745138f7f7dcd03cbc1f236f02
-
Filesize
6KB
MD5db897463022bc69318a8bc596de4e0d0
SHA12e082a666010696fef0ddc748b6e3c543fba254e
SHA2568fd7433fd6f1ea60b4430a9853cdb4b871367dbef18ab396d9f530c7a78dca4e
SHA512c2b0c13935dd76d8363efc0e88da95377e1134c098b0ab431cf61b490e9ff450ade1feb5d1e83ade666213eb81ad4e38a30d8054cd833e42a40c7d10acfada46
-
Filesize
6KB
MD5764e05211e48868b15cdc0f22792c462
SHA1204dee33ba6669378fc546c390690602de33882c
SHA256b6c1cbb41a2ec3f5e2c56e5b78c6b3fa369806558fc96d53fb32c116e6ebed9c
SHA512a460d6c453b2e498ed7bb956c82cb079bceaca6cea6456ff146c0d1fe8c92bc0df83aafc8894fd78f78075716acf6c89ec4d40a897d9d65182abfee824c17fa6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a2ac92abce8e34eadbc2268908cdb5c3
SHA15edf31c3b0a88ae410187a3c9283e357cdc9715a
SHA256766b8b16bad84c6a75a262599659acbc753053a779f337abebdc5e087f5770af
SHA512e57751294d204ce82d0d3041687734dfddda67c172b209aa139f0bed2a237e94901457e2bb27eb8a4c537fc849cb597c4001624f5634299edcdf12a2b6405d4a