Analysis
-
max time kernel
160s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
b73a633476d839817ea101c0c72a2149.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b73a633476d839817ea101c0c72a2149.html
Resource
win10v2004-20240226-en
General
-
Target
b73a633476d839817ea101c0c72a2149.html
-
Size
83KB
-
MD5
b73a633476d839817ea101c0c72a2149
-
SHA1
b8bd2b754baa6e5e69d9c5b5cc37d6f56a1214be
-
SHA256
c741eb5846d827bede4889ced89f671c0e997fdadd0e4fcbd325fdaa8874b977
-
SHA512
042d3790633eb23a5b822118e09f49c099020cd101bb0ad0eaa62408bbdd8ba01fae42358ed2512f5f9ce21f161af45359346240b871fb6aa27b979cc424d279
-
SSDEEP
1536:QXHryL1SPIQx0NcNtxNSNeNBNYNoNJNbNgGxQ:sHeL1SP30NcNtxNSNeNBNYNoNJNbNgJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 3324 msedge.exe 3324 msedge.exe 4936 identity_helper.exe 4936 identity_helper.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 3624 3324 msedge.exe 88 PID 3324 wrote to memory of 3624 3324 msedge.exe 88 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 1156 3324 msedge.exe 89 PID 3324 wrote to memory of 2600 3324 msedge.exe 90 PID 3324 wrote to memory of 2600 3324 msedge.exe 90 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91 PID 3324 wrote to memory of 5012 3324 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b73a633476d839817ea101c0c72a2149.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb303546f8,0x7ffb30354708,0x7ffb303547182⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11361288069462548166,16302691789473213656,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2536 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
740B
MD5c043cdb9fceb711540ea2063627b3429
SHA184f17cee324ec63ae58b4036d8936e3ab666e9e7
SHA2566612a84361d7d445b8f533ad9fa0bea15e6a10975552c10528a66ed1c4b318cf
SHA51226e464569ad21f281d0e023da5a062290103ecc99e7c0f5d777d162b87ac14debcf774f27ac8fd8ff5524dda265c9c00496129f1f267c9ee96930cb27b7f73b9
-
Filesize
6KB
MD55202c62ee6359bccc492d7d0863589cd
SHA149e410e6383e954743125832c70b3410364b8211
SHA2562e5e6ea50e73df166d761026b8995e11ceaab4a3ceb43ba5cb449f9904d6507b
SHA5128592a76937b310f9aa20d71b3c9c8a4295fcde09f6b2090709b24f16a9b4309acea888f46c0668ae18016a1bfcd58b4d26648320bba1f79e3cb4a673f75db1f5
-
Filesize
6KB
MD5762e2a2745e8dd13daf654ebb6aef170
SHA12416d0f27777872d74954e53a7921bf53a9d46df
SHA256a03551b4f50415b53dc0c3b85b83d2794106eb6fbbd7e0608fa91822475c3eee
SHA512ca3e4b6911e446bf9a8b3ccb9b6e971c783f0f0696bf2a2baed1082a989f1f98d2d23bf2c714c3aa4c19f20b68bed5bacb04eb3448531ee4def50b261946d31c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55e5149accbd385317c903b7c1aef2459
SHA13cd961774b9434df5f692c1d5bcb1096f34fc068
SHA25679eeca19bc243272d4b4c1403cfab66e3945f69c8bdb4f7604e0decd521a7af2
SHA5121ab7b0a76c05a82655ee18d09995197d056396126e228e6481e3da9388c61a86f5dc80fc5136347f0fe97548d2c34239c8f9826571cc065f8395e690114e340a
-
Filesize
11KB
MD5306228fb898bcdc6f91f62f810a4fc16
SHA17c4c3ad6ccb58541d484523defcf76f3ce52742e
SHA2564714bf92ba0d5437886ff5a5c4af58a4c6c244f8024908aa3a051fb6aad42d90
SHA512bd3cff7e99190233db1074e2f722c8e2f9efdc3325cf3a362972126abe37e9e7f30414c86edaa42e58e4fdf2003f4fa4a2da1ae7f0923e1eba6ba9a20240b293