Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
b7ce6d26b8507cb3bafa8116b14f3e1f.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b7ce6d26b8507cb3bafa8116b14f3e1f.html
Resource
win10v2004-20240226-en
General
-
Target
b7ce6d26b8507cb3bafa8116b14f3e1f.html
-
Size
13KB
-
MD5
b7ce6d26b8507cb3bafa8116b14f3e1f
-
SHA1
eca7287f6bfbd6a599205cff6e417451647316d5
-
SHA256
dc0c2e91dbb2035126d7729d4383a7f7d46c764e1b34c6b8cafa9b980cb25c20
-
SHA512
92689fd1be0c085d325032db7a6030a5faac30bf65e6d96eb8d9ff80de1de612259f535b93ec391c5ce6caeb13d5dba0892a9e95c98072b96c34f05b1c512177
-
SSDEEP
192:sjd4OAe46PLmmEsd4hgOcOPKnQ7LK9hjMo4NyfiIAN6Ty07lNNnpAHUnQiCWqKJw:sRLLd1OHQYU7dpqAa8a1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4736 msedge.exe 4736 msedge.exe 1232 identity_helper.exe 1232 identity_helper.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 60 4736 msedge.exe 89 PID 4736 wrote to memory of 60 4736 msedge.exe 89 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 1932 4736 msedge.exe 91 PID 4736 wrote to memory of 4440 4736 msedge.exe 92 PID 4736 wrote to memory of 4440 4736 msedge.exe 92 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93 PID 4736 wrote to memory of 1612 4736 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b7ce6d26b8507cb3bafa8116b14f3e1f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe93f46f8,0x7ffbe93f4708,0x7ffbe93f47182⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4440 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,13295344034820145477,1177392584166289834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD52d7ab4eb65d200b141a2143781d8ace5
SHA18651053f83c89d6666ce837df3e9db4ac01258cb
SHA256155995e7da5bceaedbcfb31313d71780b2a0eb4ae9f7b45a0925f06d73137ee7
SHA5126bbd3d1b72a20f1705b8376c7df6b8c194acca3851ec5d05b995bc4bafa735e61ecfd010e5e03c94567f38430ad5a132ae3600b9bbcdd6a16d117aadc7160305
-
Filesize
6KB
MD53fe630acd397fcfb43175c214e74c5b4
SHA1485af23a6b5e98e9a7654a19345098c1031669d1
SHA25625be8002c1429558b3576b9c1028f73df514fc0d6c9407c98c078cdacf689ca5
SHA512532055bddce1d7fb7c87f8caf2b1ed4426414a59106ce630a7b3a4dcd04f9b5e74e5d0bae750c950d5eabc4bc16094d497cbc21e4d2ed2dee4253fafbec8f3c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD515ce5e53c73612c7e63c87d59840d621
SHA1d47f1fe548daf1ad07957f3c943ddb580617c601
SHA256941ffdc04c741dcf969434c63ce4ec67a744c8212cc5f1abcd833b46ace37dc5
SHA5126469d57a9d484604e50059d6391b010b06485e37b4168ffee6952db24b5a942ab4443f05d572851ed2f213afc585c741b9f2f06b25b94fac39c909ba8b2bee73