Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
b4af3b5d0c76255dbeb69b5e62a4ead5.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4af3b5d0c76255dbeb69b5e62a4ead5.html
Resource
win10v2004-20240226-en
General
-
Target
b4af3b5d0c76255dbeb69b5e62a4ead5.html
-
Size
53KB
-
MD5
b4af3b5d0c76255dbeb69b5e62a4ead5
-
SHA1
865f16d065b31d6cdd0065e94c30656b507cb255
-
SHA256
e452ab1da57db91b8a11da8ea3ff6bc967a04400ed2802ccff20e8fff8a68cd5
-
SHA512
f2c926b1edfde79a7d3f29f9c5ae40cf09ddb9978bc1f2804126790d81e7ff512851beb9954b68cdb115fff4277c977add5ac7e8ebfbb33fb4d5f872027217b3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUWrunlYv63Nj+q5Vy0R0w2AzTICbbnoA/t9M/dNwIUTDmDi:CkgUiIakTqGivi+PyUWrunlYv63Nj+qx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3460 msedge.exe 3460 msedge.exe 4216 identity_helper.exe 4216 identity_helper.exe 5936 msedge.exe 5936 msedge.exe 5936 msedge.exe 5936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3628 3460 msedge.exe 88 PID 3460 wrote to memory of 3628 3460 msedge.exe 88 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3612 3460 msedge.exe 89 PID 3460 wrote to memory of 3588 3460 msedge.exe 90 PID 3460 wrote to memory of 3588 3460 msedge.exe 90 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91 PID 3460 wrote to memory of 1832 3460 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4af3b5d0c76255dbeb69b5e62a4ead5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4fa346f8,0x7ffb4fa34708,0x7ffb4fa347182⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,9121520043385923063,13525436460967675692,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
403B
MD51a2e7ed613d9c6589f4c6e828aa80672
SHA19be3c7de64864d6a25c21593851d58f546950d79
SHA2568314d2d8876371e26c7a4a5e478688bf0ece92e2918487cd3ef77df2cf85a316
SHA51219903ad08b7af8a4362800d93945b8748ee0c8b762fbc5047e1c7ffb0245c77de8903121a0f18c514e8004341c492024771acbf71a295f20947d56388137b235
-
Filesize
6KB
MD519b686eb9697f3a1348a27f28f064dea
SHA12709780bff5272fd69ceb67ba58b56a4643a50dd
SHA25658e1b68536dcda1238a8a320b9db0bed26cb5121223965699cde6341291b3eaf
SHA5125f8fad4fbd2a59ecc45d75636ff5fe6c00253514ec664b99dbee0af15eada784cf95dc5f44cdb3aff51c38b12d9f914969fd71e9be7163bbd9635499dc3b536c
-
Filesize
6KB
MD54d4d11960ee32db1bf360388e5c25b80
SHA1e3f1697034c91eddd8197f32931b63ab0c5b3172
SHA256092388afd1565fa872c58bc451ebcad619dfe0a3439767529f3651c81a86d57e
SHA512ad43c936a48d7212a06b5d4e245f9f4671ec307b40e73f59565c23565495a538a4b60164a969f82e4c91d97ccaa30e7c2769b2ce489abeb4d4a73ddea9fc2fda
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD52d9d7617e4abb5320efd8ac78d15d183
SHA12ace2ce0fe09ce90b8b1e2bced01e43be16d8f58
SHA256cfa85bfc35f370c43959b75ba49b45b741ca5ade01ef4c6f6d3d87c27da404da
SHA51225c2a1fd7b5cbcd990853effc0399a06cd587cfb427762da8d0958871fb68a0e7e53dbaef4e1d33b66888c8a6c2c3f5189bf1dc8ae2468223477a4c11c1892a3