Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
b97b2bfe96173eda1b62bdf25b35fcc2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b97b2bfe96173eda1b62bdf25b35fcc2.html
Resource
win10v2004-20240226-en
General
-
Target
b97b2bfe96173eda1b62bdf25b35fcc2.html
-
Size
842B
-
MD5
b97b2bfe96173eda1b62bdf25b35fcc2
-
SHA1
27b90ee76e3df52f33d6e86d7035e97008eb5ecd
-
SHA256
e079b4f015e143f99fa595c5b70ccc90f85b0b3e61f7bd8b98f8859a7f7bd4a3
-
SHA512
e9ad6af026febf8a606b0b9c0e24806e304c9d117563887a2188f8d2d7b47e9d7e04e9ab6ecee0f9b0e57c56a1dfb1bc4efe98990757a7ebe772380010f2ebf5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 1856 msedge.exe 1856 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2264 1856 msedge.exe 89 PID 1856 wrote to memory of 2264 1856 msedge.exe 89 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 2276 1856 msedge.exe 90 PID 1856 wrote to memory of 3216 1856 msedge.exe 91 PID 1856 wrote to memory of 3216 1856 msedge.exe 91 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92 PID 1856 wrote to memory of 5112 1856 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b97b2bfe96173eda1b62bdf25b35fcc2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff978b846f8,0x7ff978b84708,0x7ff978b847182⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,7321828147634673422,17470872909485183682,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
189B
MD54e5358a2c6de92431acb4798a23ef492
SHA1889ed02171f7e1c06d062073d67c9b8267e12f3c
SHA256b65331a600b2b21865b77cdff50bfc8550ef87008413ef3d99a9a1084b5ce38c
SHA51230485b8f158127294fd53afed26a245aef98c49e2efdcc1a32fbce60d250fe4a78822005a18bafbced0b9dec34e7ef3c82a0b28baf0f8a1523337827984a95e8
-
Filesize
6KB
MD515da57ee2c7d6b465df9cbaa8f0e80d3
SHA12a8bbd06f73381cd6e8e8b857bffc9808bf81d33
SHA2567a268b434970d4edaaa209a112ceabc4ee55c0e9f080d3eef0386332f26d7dd1
SHA512b10e6436080fedb36ffa020d591b3eedac0fb7ae089ef3fcb55b00b03730a14420a5ad91ad89bb3150b132bc4ef7652f62a700cf9ce65d9a8f37a4c9258a445c
-
Filesize
6KB
MD570ea11cc670241212d8bda9f6b3f1197
SHA1bf2f0c432dd3385b532de8a5fa6aeabd11a6e9f9
SHA256a4e7bcf58353be0bcd0f2b6a04a99df4a6aa93c189f5d8e39646071857cd5be5
SHA5121e4e818402eed950c5ad64527d6f39c12304b83b5729953e17e43003f90646afc1ffdd7ea39d5fbf3c11d55cd1bfa91e356ee95edf842fa01f4b98c4340754d5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56b004c135d391b615e672c7059a4422e
SHA1bb6acfd428cb6ed292c52fce3e9c19d71b0dc6ba
SHA25633d609851435751ba044819dabb75a3a249f24a8f561641f1ccd5517cd81ec0d
SHA51208fe49c94abf916a1982d35b4be6fcf676bf68e37d0f31d616f0768b2d6ced4d8ce30fe0331f55b98ecdd723c8b574bad824b9ec9e01fddc34292eec9c36289a