Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 10:16
Static task
static1
Behavioral task
behavioral1
Sample
b72c3ef357529ed1d5a0e241d0f74c1b.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b72c3ef357529ed1d5a0e241d0f74c1b.html
Resource
win10v2004-20240226-en
General
-
Target
b72c3ef357529ed1d5a0e241d0f74c1b.html
-
Size
34KB
-
MD5
b72c3ef357529ed1d5a0e241d0f74c1b
-
SHA1
4100d75f6b495887366caf3650acb7e3ec7e6627
-
SHA256
38b15513fc633a7f631c66534c8ff6749ea4be63e740c989fec4c9048eacdfff
-
SHA512
678196cd22de583f9b5f64abc0d3b2c410511bf86187eb26eaefff2c277994c94a1cd030e6659bee933df85aa4ca986030c5d0f7b3d858d5100887b4487bf823
-
SSDEEP
768:J8yl6nbHSLhJBFGASp2maqxtId3cHCneEWJ:Zl6bH4JSpoMinNWJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 4440 msedge.exe 4440 msedge.exe 3800 identity_helper.exe 3800 identity_helper.exe 5368 msedge.exe 5368 msedge.exe 5368 msedge.exe 5368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 4600 2152 msedge.exe 87 PID 2152 wrote to memory of 4600 2152 msedge.exe 87 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 5040 2152 msedge.exe 88 PID 2152 wrote to memory of 4440 2152 msedge.exe 89 PID 2152 wrote to memory of 4440 2152 msedge.exe 89 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90 PID 2152 wrote to memory of 3824 2152 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b72c3ef357529ed1d5a0e241d0f74c1b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb0d246f8,0x7fffb0d24708,0x7fffb0d247182⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1340 /prefetch:12⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3424 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1848,18374011768505214305,16631564109254168223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
663B
MD5ec281b2eaaed7048cd10b141324fd183
SHA146f96d7b5771951d3aa65c766f7e2cced061b062
SHA25699bdb0eeadd7d6dc81b42a83bc0c5ec4503bbcd9c6bf0590c858710824187fec
SHA5125a5e83bd0f9cdead166febbfe52e25eb2513b06170b7d61880658cc641e9f1b28391df61ed2f8ae58f7316d89dc88a0e36ab21f9df91d2714265572523bb3f71
-
Filesize
6KB
MD56585a3cfedca2e59a23dffadbc045e23
SHA16caa4edb8947f1300b02402feec5f75374a18652
SHA256c8e600aca44ddc433533f01ec83f1e568b82c3f6a913802ddf8a3de538389e1a
SHA512ecbca0c69591f74d33b7ba8e96b6d4662904c5ddd020766bec96c016f664909852704e0eb069ba58cd4487458245ff941019d29c9143fc63da964e56ee245329
-
Filesize
6KB
MD5a827f5e2f3e45977178c50c315d4f703
SHA18ed46fce72563577c84a78bc4f02b140211d2f57
SHA2566b44a20608f1eae6ca1211bce4de022ceb51f39d7d4dd5b3a87d7d173525387a
SHA512d55498d01ed7f8fbeca5676ccb45fb93bbb1ff24d1947d5ab26717423d2e88bbb069c7aa8f7b9ec604691ee171927e192c19898093e649cdb5538c7d9584a268
-
Filesize
6KB
MD58d56088676c75fbffeb8636fad5dbbc1
SHA1d64cf123ab763a1ec64feb1c44f9a317eadc7e57
SHA2567daba1b6d445cdc2dcb4de5893e948688d7a2a20bcf28232a93fdfba7858b8a3
SHA5127dcd2bae03d0f44faac822ebb7d9dbc1e58c96289f12b7277f33c8029a4fe00cb13f6f3799bb81c9940bbbf7cd8af1470a329ca0abcc1808ef8d2402ee3a5855
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5133408082a28560bae8c6c379d197754
SHA1603dbe0d9ea615628a50ae940ce7ed0f1ba9be3e
SHA256a90c5bf6c4a8e9ba9448a2ec222f73e437712e08606139929444f8dc9ca9c15c
SHA51288e3c20f82c3c04f5d26b97aae06d88e196cf8bca49ee10af173249cf90e5effd7b14122aaacee0b5bc0f556b37a0b36939ccc5356d9c06cf00509db3d2991de