Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 15:00
Static task
static1
Behavioral task
behavioral1
Sample
b4fb5bc5669ade3b37e1feeee12f923d.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b4fb5bc5669ade3b37e1feeee12f923d.html
Resource
win10v2004-20240226-en
General
-
Target
b4fb5bc5669ade3b37e1feeee12f923d.html
-
Size
53KB
-
MD5
b4fb5bc5669ade3b37e1feeee12f923d
-
SHA1
31654398f801e403f6328ddca597ddc19701076c
-
SHA256
e78792e6294f7ad836edfc81d7a3e125b701b0e1a59a927a8716099a4126d36d
-
SHA512
6feb10cd1f544515a4d6e1dede8757488810e86caf10d0bca6b10b60ab283e55d2f5286fdd7e229264c6b5a880ead3e8e106dd7b2ef6da27aa7e64ed3e5c3b16
-
SSDEEP
1536:CkgUiIakTqGivi+PyUirunlYkM63Nj+q5VyvR0w2AzTICbbyoFo/t9M/dNwIUTD3:CkgUiIakTqGivi+PyUirunlYkM63Nj+O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe 3856 msedge.exe 3856 msedge.exe 2268 identity_helper.exe 2268 identity_helper.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 3160 3856 msedge.exe 87 PID 3856 wrote to memory of 3160 3856 msedge.exe 87 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 436 3856 msedge.exe 88 PID 3856 wrote to memory of 3920 3856 msedge.exe 89 PID 3856 wrote to memory of 3920 3856 msedge.exe 89 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90 PID 3856 wrote to memory of 2780 3856 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b4fb5bc5669ade3b37e1feeee12f923d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc233646f8,0x7ffc23364708,0x7ffc233647182⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2812 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12382961180963899366,391951725630494382,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
402B
MD528641628b0eaf16d63ff1db261799e7d
SHA1726f0f3da9586a8f1b69cefcfb986201bf78868d
SHA25658d4525f5c2ec82dc5628a6b428b32623c3d73a0eb2f36443313a818438ef4fe
SHA512b655de5773a75394192d658bf491a994c3874b114ea33fb8541850b5e82a3f3a1d2586279fd40d2e6e0e1f9c23dc404c6651187368ef64073bd35ff9b8e4899d
-
Filesize
6KB
MD574b7b7acaec7265f3a0c7477fd1f0ca4
SHA1e415c519fe6c8150959e9ec4a099dec5bdaee696
SHA256dc0609b278d99401fbbaa5fdfe680e6509867a3bbb780d4ad5a3b013117e444c
SHA512d66e0dd2b18b5329c7f15cd434df4d2edd3cfab497ae768d4c20a21828c5502adbbd2ad0f444a503a1fed0dd87f5ab89fa64566d83c0474d73850c162a3edc5b
-
Filesize
6KB
MD588b984dcbef41cbb5dc84baf74bd433a
SHA15abc55c3e9464b8133871b6195e600fc6b7c3394
SHA256ddeaf29d9deb227d09e5829dbcf53c845ac6603d5c9d2a605ab54842723ce52b
SHA5126654ccbce1046cf02cd0fa04bc838ef9b3ed7df28da817a69bc6966b85a9f471354c294c3317369b3a6a8867408e9874ac133bedfdbbb357f7afce4b19838888
-
Filesize
6KB
MD5e64f47c60341294f6d6403d5cd557b35
SHA12ff48a8a9fab3c23025e020e13abd619bf5c02bd
SHA2567d84a31a97a4fa0f6bdd353ed25f43a29a3e80012ad38cdef7dfeee983e98ac2
SHA51240c802439951ba591c47fc6141dc762b778d90817291861b3d459e3942876fad6d082e76baa5b86b4830366dc987aa99afb1cdf12827732bb780b6b910d486dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD545fa4ab7b864b67f1c36b6ab9ad7da1d
SHA1dbb4824f527c503f9d9dbdf1148cf81e922d27f7
SHA2567e4093c2f97b8a9b561c9f304909daf89a86e98716b2c98f7407a95b310e86b9
SHA512c3eb20de9978a57e0c83f5063709f32340a1e551b31ebd6e277b48d630b724cd8e091aaf5af725cb2cd9dae8ac4113f7d3e46aa460bf47b28c46efd106253f3b