Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 19:10
Static task
static1
Behavioral task
behavioral1
Sample
b57545a56b7d21bae44e4fc1ecb0cbcb.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b57545a56b7d21bae44e4fc1ecb0cbcb.html
Resource
win10v2004-20240226-en
General
-
Target
b57545a56b7d21bae44e4fc1ecb0cbcb.html
-
Size
98KB
-
MD5
b57545a56b7d21bae44e4fc1ecb0cbcb
-
SHA1
8ea6d0020affdec55be96550589867b902d9ae99
-
SHA256
1c2b8846a86aee5d56eac4e44b62ecaae87735cb88b970e440d6db9a7e509fd0
-
SHA512
f2f3913c806025cfb257545289b5573da24f99a0b51cda70c8cdb599397ff605783240d3d0ab0bcd82ee00cb981ece465c3bf88d5125ce20a9ad86c338310f54
-
SSDEEP
1536:st2WzD6bitRBQHQzA6H3MLC3IAeF+sGyPA0XMiA:1MZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 3396 msedge.exe 3396 msedge.exe 688 identity_helper.exe 688 identity_helper.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 4284 3396 msedge.exe 88 PID 3396 wrote to memory of 4284 3396 msedge.exe 88 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 2380 3396 msedge.exe 90 PID 3396 wrote to memory of 1776 3396 msedge.exe 91 PID 3396 wrote to memory of 1776 3396 msedge.exe 91 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92 PID 3396 wrote to memory of 4044 3396 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b57545a56b7d21bae44e4fc1ecb0cbcb.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99c9746f8,0x7ff99c974708,0x7ff99c9747182⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,5999257758722223765,1139554831125768033,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD557a5d162d93c4d77fdec0e5f73a76a15
SHA149dd32e6f88f8292ed93dd2b7fa4b7c7ebb167dc
SHA25674c9e7c738595eb7e9b97fd6d513b1e9e9cc74151b26f08ec946b0edfe0307b0
SHA512f4eca3bfc39296bc6488b642c4938a24b38808c0b2de94fea6e43379e3dbb1a4a4975a63f1b17b4cc49c4b6c3bb63354696255019a65bbe67a0375f4c60b4d1b
-
Filesize
6KB
MD54dd4c4ec91fd347df33fc79879cdac38
SHA19b04e0d847d41a0d24cac8a463de575eb3dccc8c
SHA256258488bb865e75717488d6a9ff5fcc96b690d415fe7f8da067fbd0d1a89e5858
SHA5123754fe3faa9de9f76e989161d0453d67ac77ba8b79070660368fd1d1f56862e70a1857b2b4a7469e5026d1a23ab1c43bdb3d0fd3f3a720e0763f57375587cfe7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53e9610b2b40047cacbee4e235d9339a7
SHA1345d80c2e03c11b3239ab09a5926c8833c83e78b
SHA2564cce3e0892ee20d9295830805521878495f23b8221d64d226dc79814ac60c3ed
SHA512efcc3bc189c3e704917528804ba65dfeb1d0ab39c2ca45b8d766a8e66d84c7a51242decd95831908a8d8988ad8791ea948f3561619bda35b754264f29f937563