Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
b6ebc2c994ed8f425ad0c00deedb494b.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6ebc2c994ed8f425ad0c00deedb494b.html
Resource
win10v2004-20240226-en
General
-
Target
b6ebc2c994ed8f425ad0c00deedb494b.html
-
Size
11KB
-
MD5
b6ebc2c994ed8f425ad0c00deedb494b
-
SHA1
899cfb6221a9741d8f3f9e84d4b79c199f4b1d11
-
SHA256
e2554bc8db7296c663d867312637242773b284eb430fef070c8fcea4346325e2
-
SHA512
a8ef44af7603f38a48c0bf654cf9e532b1098dffcdf79a892c5e296a9bce338521672bc77168c1856e898c0372fab5a58ff832b0697fc2b6cfc5dfd81f095e4b
-
SSDEEP
192:2ValIsr0r57M4rxaKT8IV/w1wvqLkt1nsw8uBuLbdU8d:salIcIQ4rxacV/gqnsw8guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 992 msedge.exe 992 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 992 wrote to memory of 4792 992 msedge.exe 87 PID 992 wrote to memory of 4792 992 msedge.exe 87 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 3804 992 msedge.exe 88 PID 992 wrote to memory of 2152 992 msedge.exe 89 PID 992 wrote to memory of 2152 992 msedge.exe 89 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90 PID 992 wrote to memory of 4796 992 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b6ebc2c994ed8f425ad0c00deedb494b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5393743695434112898,10620433108685068876,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,5393743695434112898,10620433108685068876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,5393743695434112898,10620433108685068876,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5393743695434112898,10620433108685068876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5393743695434112898,10620433108685068876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5393743695434112898,10620433108685068876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5393743695434112898,10620433108685068876,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c61e2cf09c13dde7ac1f04ceb5263fdc
SHA1d570109f391786fb52f272497904e6032b67a24c
SHA2565428f8ede68ac4c9874f3d3732c8b0d074a2eb0b07216e5d18bbd977239fb05b
SHA51286c75f652e4a0fecfcdb94b19d07ee6d5b9daf653ca3c0a7922e15cf8b306db87c44c7e2408159ebb87096760d08f151095a9f106153cd6e5b719894c93121b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD55ac8041f4a0f8b975755dfd0a45e61f2
SHA1e2bb432bbc10cf87fc746dda0486f0b30862a3f7
SHA2561fc36f8bf94441531800e152571b59b560890cce614a03dd05b90e6c27e9158e
SHA512606387008e6cda50959187bbc1c6826dbd99c3dfc6ce379b3a065e8295ecb4e12ab6c0cc2dae98ea483701c13fabb58ef4d85ac512b628abce177fd5b04c3c9b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5c2346fa13d619a4cd0d0faa41aec017a
SHA16de1e0908da6d8b336cdde0d567bbc29fe69ff58
SHA25678099974d39c855556785cb9bef0505bce82ac3d254a2d603e50f4f27efbdeb4
SHA512fee30eeee4c73b554bb0a48d773bd5ff9aa8d11ca6984eae7d2233780ad6e7284ff765610727b5ce0f36bb11e08a5eaefd409bb0ec46f007b7db3af55a6e84de
-
Filesize
6KB
MD57ed7003792d4a885ff37a808bba8a165
SHA10426962db37070e7a403147e92465cd64d95c64b
SHA256cd76f776fcb020cff5ca433b0202c1ca46928dfd47189e8e642d9168113029c1
SHA5125f269da78ac6cae480542e287df7af7654db55c6ad9cc31547129799e86d01fe43fe0d51cf65de3ff9f790495de10c50689ebcffcea7333b8e0077277e6cb07e
-
Filesize
11KB
MD5a747333538f7b2ac4e0238ad2711e9c2
SHA19ce9c5780399092b9f57164f4d23694740a59f6c
SHA2561f4ec828bfc6205f03ad0f13585653fe12b186c94d67dece9f9a8a46a0f30764
SHA5122680a85a1aa9f67a3d31a971566fee011abf80a320abe668d0262b3d2af885f42d71c15ab30dfde5b5156ba93c9e1eced35171f104a4d8278be07a588dac189b