Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
b825abd98221de51d29e0a1c2e5c3508.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b825abd98221de51d29e0a1c2e5c3508.html
Resource
win10v2004-20240226-en
General
-
Target
b825abd98221de51d29e0a1c2e5c3508.html
-
Size
10KB
-
MD5
b825abd98221de51d29e0a1c2e5c3508
-
SHA1
ccb5a4b5c0cd129a0705070e3df11108d26f2b87
-
SHA256
9e7d77574a9e4377a3caa6a49e8f67a1e86d01c7a596b444fa0d5f6f3a34aa30
-
SHA512
b3ff2672647a2bebd21a7f505507dc42a415e43638e56cb5203960aa21c897636997be8f9ac15af24ac68ee1546547cffd9fd03bf19b5e82ed411dbfee0ff542
-
SSDEEP
192:OVUprKv3TxTuxl3g4ItXiX1RD2CyVPC1TI/ZzpZ:O7Pklw44XiXXWK5IF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 224 msedge.exe 224 msedge.exe 2484 identity_helper.exe 2484 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 4672 224 msedge.exe 88 PID 224 wrote to memory of 4672 224 msedge.exe 88 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 3288 224 msedge.exe 90 PID 224 wrote to memory of 1744 224 msedge.exe 91 PID 224 wrote to memory of 1744 224 msedge.exe 91 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92 PID 224 wrote to memory of 4912 224 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b825abd98221de51d29e0a1c2e5c3508.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe208d46f8,0x7ffe208d4708,0x7ffe208d47182⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1115073250264164520,13374735459602132741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:12⤵PID:4800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
690B
MD5e3a25a995c7c6f67219ff807e4183a27
SHA196f3cac04492b20058d472f4d915daec15157d0e
SHA256829f85ad69e72cf7fc1ba71844b746296431452fe3dccf28fe0901ef39246c53
SHA5127a10f3574c7b0e3b4dd825f698241b59444be9011627e565b0cb874c0e737d19a260c8b95f76aea00e2903715405060aa36ac745c8bb52558edea167407dd4b5
-
Filesize
6KB
MD5ed86bf0bfd74ce277ceb8e8088be865a
SHA10ece5bdc747043abf2de582f2257bc33609f86d7
SHA2568c0c050a30cc0200c4c41719320ccbe7442e96cfc4b18d47389bc44b89a1d998
SHA512601b0025fc0ba097210e63022072a713533765a90114b1a8877df09547a950db557896f5c60f628f6c95346a3fc21f250892c624b3ed32b66c69e3f2bbe394cc
-
Filesize
6KB
MD5a4c09312eb0af0857ca8e763b3edaf62
SHA1002e8a08a5cd2404a764d87e0ffc48202c74195a
SHA256a3cdfa1b11d2ceb350a1955f1e973df38d88e765793728123737da319e1066b7
SHA5129c5a433ab0524b6f6b125a86e189e5340c6e265a18f428e68cf8cdf12cf4ce4f6cb8c27c8b9d4d1310a87c5c5798073e19343ff3bd08e5de244df6c4a00e1686
-
Filesize
6KB
MD5aa7dcc52abe22b2ddba808890bdc23e6
SHA1d155ff94da359cb879272c32a30b16aeeff0af4b
SHA256701793ecf74caccfcc008e7bb138036d96991e862e9d8f6cda6cf4a3e33ae997
SHA512b3f67b4852f4789be7c6e9d149df01939a1d1c019e70ae59cecbf1821cfdaeb7214283e3887ee29bb2b4c68cd4fff9535031c0a6dc81f13aef1351960d8b171b
-
Filesize
6KB
MD5475013259d00646c822fad8ce1a0dc1a
SHA1866ab877cfea7b64c5dceb623663ad50609f1238
SHA2568e69e4d55b4e05ec2fb2154d8c41a7800c145d2693df2f70b63e285bfc326718
SHA512d78ebcd22f1e5302d74ac34e0f9440a7e38b29527082a04d25e2283d893abf72cda96f780f6ce7bbd873c032b49ee3dff159963f722cda8b6c1574d03ae3acd3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57ffcffa3405c79c28bb7a7374999ca05
SHA185059d3e27d8e067aeb154dd4662086d34deb796
SHA256a28c77a023ab4fa560fbe46f4eedecb8b6c5e51a6a41ef5b45fd3cb119a25edd
SHA512080ea5cff803e955a8ea4ee973619a4ebed536d586fa6b755e7f8fcb12be4bdc9aeff79a5f943f5999728a0fa6c973b83858090eb5fd496f93180b92fc36fda1
-
Filesize
12KB
MD50dbb16671216272489b5792368dab2ea
SHA198e17cbc7a237ae843b2f447836ef47b9e3c862e
SHA256b25b7b0e531fa47e69d07ef8f65e43c0fc812bb2dd1f86b3f1039bf37dc4b331
SHA512e21ad8417ed6767e687e24e9e0d1752d2321ae722b2ad6901125d1f8128b798d18ee5a921fafb4e0257c8af5e3f1ef05e0875bfdcfd2070a50027b772f4d4d22
-
Filesize
12KB
MD5341d45487c3d601b6d36300e3e23ac50
SHA1afa0945c6f6f721afad2de29813815fa47e2cc3b
SHA2564d1d9e9fd793e9b19ef5f3971f6770847dcc53bb8de61d547322609d878c6f67
SHA51235832877f90bc0b36b6b68581cf79c22a5e74421a1d084c0aa068b6ccade4e26d2565f05939fd708c18d11b386c449375589811a23056abe7edf2026f7de691d