Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
b7d22840b736e47fcc6f2f163a13ef4f.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7d22840b736e47fcc6f2f163a13ef4f.html
Resource
win10v2004-20240226-en
General
-
Target
b7d22840b736e47fcc6f2f163a13ef4f.html
-
Size
84KB
-
MD5
b7d22840b736e47fcc6f2f163a13ef4f
-
SHA1
d04956e331365e846e718311ef3048555143bf1b
-
SHA256
4575719d504013ca6d6ae461652a7d51a99a119c4b19a3692b1175acb5578da3
-
SHA512
ceabfa4dd095c6a035b8cac878091046d16347bbfec9f9c76432a91697e6f102ba90b09fd9aa7c1a29765b303b6db95cf91b50e989537e53f6300c3b11cd0191
-
SSDEEP
768:SVWQ8kXv74YMyUt4xwlHrJ8ACJ7E500PAHINtc8+r1qNaTyfAU3xntF6dvNW:S18kXv7dylHrJ8AdAItt+hNW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 116 msedge.exe 116 msedge.exe 4792 identity_helper.exe 4792 identity_helper.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 4068 116 msedge.exe 86 PID 116 wrote to memory of 4068 116 msedge.exe 86 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 1816 116 msedge.exe 90 PID 116 wrote to memory of 2300 116 msedge.exe 91 PID 116 wrote to memory of 2300 116 msedge.exe 91 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92 PID 116 wrote to memory of 4084 116 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b7d22840b736e47fcc6f2f163a13ef4f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff06ce46f8,0x7fff06ce4708,0x7fff06ce47182⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9901519804010017635,16289461826878959308,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
6KB
MD5c42bf2329327ef3c7dcae50b751b217d
SHA1e36e5a01de7601d62d7a42d16c74ba206b7abfdc
SHA2569f6699f0ee8244a14a70946c7feec7e0de271e339ee0a061ac06aa61452f0941
SHA51201012cdd41137e26962c68ad18e60119bf5e8fdbe70eab5a8da8d589fee660e4ab6203daa7f57387b4ef11afd27ade618f5e442f4b7fd874791e8cf5d7383741
-
Filesize
6KB
MD5eeb7011d7435e20bcf52e914e4a4b154
SHA167d3ed491b11a8b43d2e7438f5ab2c5ce6fbd05e
SHA256439a3136c1abdfc891a44d14fa04490a18d12349c0cb558d412032511060c37b
SHA5128b17a08ef133a86179f0e8faf54516413a34217ed1fd4848186b228de2bbd486266af1fa6910f8e2ff71d2c390a52305be7c197b984d4594045dc7eea8da387b
-
Filesize
6KB
MD5deb872e1381ab6f0f301bb75b2314874
SHA14a7729c6769815a3c21c097e30e3721ab7243efb
SHA256a81eb9b12dbffdf96d7039608b434f1993b9bc0853ab7a2aa38a7efaaf24e037
SHA512c6cd1f5a3bdd95be41b078432f626b7166d7d04cb856925e54122a93f0feec4dab36ea29a6906750c3983d36b7ea72b87459fac08e03e70dfd8d84e6ed892b87
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59be2c95baea7b9356016583e54495049
SHA191127dd1f8e351e3e630ad1587dff3cb74abaa8e
SHA256ce741531151b27dd15523be7b18548b3ebf400a87866ad2a5949f792caefb002
SHA512ea1bf936a119c69ab4c86bb39d839b14c1ebea1fdcaed2015011c0168ad2ca6bab0a7a64456c3072e4c312219ef7b9ba0d3e068075fb4936fe490c5816071e32