Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
b4dc11fccb9c2cdc4291db7dd5b42987.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4dc11fccb9c2cdc4291db7dd5b42987.html
Resource
win10v2004-20240226-en
General
-
Target
b4dc11fccb9c2cdc4291db7dd5b42987.html
-
Size
3.5MB
-
MD5
b4dc11fccb9c2cdc4291db7dd5b42987
-
SHA1
366cfa8352d372d93e26fff4e769eafe697457b3
-
SHA256
dc045f15d970bf3c61e6d5bb72bfd4aa822cc76e4d5ca0275d0c82e36107f512
-
SHA512
44d177a8424b7bf0cea47d41507e04bdffa639cebda06e65061a69a9f7157074c611fbd1bb788ae457ab6cd50e0c93e7c4e053acdbd5195cb75c9df5842ffa06
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NSA:jvpjte4tT64A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1044 msedge.exe 1044 msedge.exe 3912 msedge.exe 3912 msedge.exe 1780 identity_helper.exe 1780 identity_helper.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe 1872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 224 3912 msedge.exe 87 PID 3912 wrote to memory of 224 3912 msedge.exe 87 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 2004 3912 msedge.exe 88 PID 3912 wrote to memory of 1044 3912 msedge.exe 89 PID 3912 wrote to memory of 1044 3912 msedge.exe 89 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90 PID 3912 wrote to memory of 1488 3912 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4dc11fccb9c2cdc4291db7dd5b42987.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9153446f8,0x7ff915344708,0x7ff9153447182⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:82⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12725626113410891136,6368692653881498313,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
981B
MD5eb4bae40b6c437343447ceb1fd71b3fa
SHA13e6068beddab92f163aa999cad82faf8469d9a5f
SHA2564ef8d087bb063793d661a6fd88936bf07511f4fb4820113d44d3576b524f485f
SHA512b7f94494b602257de313e6fcbfef5b40f4bc94df5656dd4b1d75a830405eea82b3a407e55e0fb71a742a069bd6be9039c184c343170ef5dccb58cc796ba7f167
-
Filesize
6KB
MD5e0f66077bf7d877079ba8156566f44a5
SHA1c58a56516d72458c39bc36c7efe4eb20594cb706
SHA2562d3112e528fe1a161cf495a025cf932a4ae96ff4e916b0b8c03f2887a7eabae2
SHA51274d52882ff545b68448bdce070c4387e0bedd9e7fd986a1012d6ba4c41b52266cd60170b0d3b745e86c2668ade16eba612e49e6425f632622c0eacbcc4caa8a4
-
Filesize
6KB
MD5a9d90a0373cf3ca80b4f304fadbbf973
SHA126a7b65dfa562b6c4c1311c9e264a748905df77d
SHA25649769db2e21a8bc0304e8347f27ca58e8706ac2b5226c4aff455828bcd3ac76a
SHA512df4fe7e2085e1e84f363f84d580d349bd967d6f41263868f8adaa96c733416416f51b579f3c97c5da833c1b3334e86f7ec50b7479317ec5439260e8103064bb2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58a7bbd6610a330e37073582e426c2150
SHA18c4fca793b4529a5761553438603f228c6b8ac2a
SHA256156386f095dbe453392f955687e22f42b284deba10107710ec016908be754fb6
SHA51267a0a9a98f9ef4bc238d3ee84645208d4ddd3c099817d982d8b18f1ad3b19e859cc67966cca601fea67150f4956feb1ca3fddefbe8f7f642dd5b91e7dff0c15a