Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
b6829a0261115a123851f79e15303e87.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6829a0261115a123851f79e15303e87.html
Resource
win10v2004-20240226-en
General
-
Target
b6829a0261115a123851f79e15303e87.html
-
Size
3.5MB
-
MD5
b6829a0261115a123851f79e15303e87
-
SHA1
f4dbe511c5026f696e67b40f2b0623b9a729f447
-
SHA256
fae2137dada976fa28fcc63a1fd4e9cbd6e759243bc824b1afb07e6379d02f8e
-
SHA512
c29bbf1f0324f6f92a1cc3d49614305bd30d334e4aa1f5ec5719183676fdf3a0be64122514477c01dc2fde4c0fb4b200571f60a5178c9dc28a5e143df1f4bd30
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NNO:jvpjte4tT6DO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 4968 msedge.exe 4968 msedge.exe 4576 identity_helper.exe 4576 identity_helper.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 5152 4968 msedge.exe 87 PID 4968 wrote to memory of 5152 4968 msedge.exe 87 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2308 4968 msedge.exe 89 PID 4968 wrote to memory of 2468 4968 msedge.exe 90 PID 4968 wrote to memory of 2468 4968 msedge.exe 90 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91 PID 4968 wrote to memory of 400 4968 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b6829a0261115a123851f79e15303e87.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdd4446f8,0x7ffcdd444708,0x7ffcdd4447182⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,2223667141533356316,13760365617872859993,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
981B
MD595ce7662d55f9e0d3b056cfb5e993625
SHA16cd4c73c69cab266647463ff2a719d117fbf59fb
SHA256870c98aa295068149fd84e615f871c6b18c396a416dbde57c958ce9db6fa3c0f
SHA512c1d8ec10064702c87a4697e6784a7fdd28f749dd1d66914e6b5be48e33bb5355f51dfc7b586fbaaf83ec7c36ec3ad1dbf2842b44b126190534a0d99bb7b70996
-
Filesize
6KB
MD5a97650b5d483f7e8603099fdad39fbbb
SHA1acafb40dad40df9c679a1a1b6bcfe1bcb25f3237
SHA256b5a3e7627cc5b8c929fbe34f338660818c66072e8a971bc780b5708a5e9102c0
SHA512f9e53d6505b0f97000914da38513206d9c77a336a19b416887297e2bd51bd5d3c6a874901a65eca758ad646f59639a58e0fafc5d2af705d85f6b3207d3ab859c
-
Filesize
6KB
MD516f5aea2290893f18d10d56e2b5e6ce7
SHA179222a5f0eff2abdb0c560d50d2104af0a7a5f0f
SHA256d3c51cb0d12d9963f416b431892831f81b7fc7b9ec3aae567fbbf7603149be8d
SHA512f1e3c2bdf9e1ca16a1ec0f1fda4b0062b695aae5d2c3ede3b47264caee054b99bc36a512bde3a777a1a72a53b98aab26df1c25b7789ea1451832004ec57e26d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dfd9170dd482fce110b95b62c994f15b
SHA1304cd3ac29ef4ba6715e0bea2380bade1165d1cc
SHA256009825ca4d2d11cbfb9b0349f829b8e2bbdea321daa95a6a9fe51959807ddf32
SHA51208b661f23673d7c63b874dbee912f77eaae80c343b5a040d5dad32038110ee0b3e7d25bb43cd539409a69f7b3ebfc004aff55d6d5390cfe112826541e8aa455c