Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
bbbfedc6890aca5ec003cf7d25259622.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbbfedc6890aca5ec003cf7d25259622.html
Resource
win10v2004-20240226-en
General
-
Target
bbbfedc6890aca5ec003cf7d25259622.html
-
Size
75KB
-
MD5
bbbfedc6890aca5ec003cf7d25259622
-
SHA1
95fe22ec40a31f700d6cab845900eda242e6a6be
-
SHA256
6ae183f124513d44f8143a7fb42912c2312589f269a8b817d7d09429b582fdb4
-
SHA512
2fac0345004101a265bf1fa7987c3036ed8f6d839f4090d214e306a1de404a0a54566c21165967154737a3fa78fffe3c5ed5d2cb147ce84209a9da889c85c5ef
-
SSDEEP
1536:jYjBhNrv1XIvP/35RGvrxcVoXZqsTOE6M+4UwpnTRchImXlaDT63V6yAJ757kGSf:jYlhNb1XIvP/35RGvrxcVoXZqsTOE64O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 4704 msedge.exe 4704 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4304 4704 msedge.exe 88 PID 4704 wrote to memory of 4304 4704 msedge.exe 88 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 4740 4704 msedge.exe 89 PID 4704 wrote to memory of 1076 4704 msedge.exe 90 PID 4704 wrote to memory of 1076 4704 msedge.exe 90 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91 PID 4704 wrote to memory of 2204 4704 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bbbfedc6890aca5ec003cf7d25259622.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd205a46f8,0x7ffd205a4708,0x7ffd205a47182⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7432152612153297493,12683919797383049084,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7432152612153297493,12683919797383049084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7432152612153297493,12683919797383049084,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 /prefetch:82⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7432152612153297493,12683919797383049084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7432152612153297493,12683919797383049084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7432152612153297493,12683919797383049084,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
861B
MD5d88bfa5a6a959ca9281b895c34692aef
SHA12c7057c1473106a1e18d102d6a718e407c754e73
SHA2562074bbfe6269430674e5d0039f8428cb8330e025715c944aee3c8db400a7f9b1
SHA51207d4c726b1208ded7a63815f8ff20f06b6a510ea4486e6306d5fbf67b015226221c23574d74c2e849e8a73d31f49e92e10b4bc636dc36d325cd4d04a512b5a7e
-
Filesize
6KB
MD504307cd27ec7a35109128a2a8a00b084
SHA1c46c9ce5e5f38a19be230f861f91e52e0bb2eba4
SHA256f6c1654c68902a35b75eb34ada5d901a507c212301b01e26c44fa7c60008aba4
SHA5120086ffe3a4646cbb56406d1d2efe6e1473b460f07540040db5f882c0b732ce11a03b97391f0626e51a154f5f2edb94da727f8f9e4c352ce31478f2bf80106afa
-
Filesize
6KB
MD5f39b04506b5675b675182e5f5ded3322
SHA152db6e354dc8f2e1b2b4f30bcded6b55217f0db1
SHA2566a49a45e4127860b293dc65904bbf322f0a44a8b6e2336eb6524c08b87e9f8e2
SHA512b4f964d22acd54d4566ceee0cc932aec4d0f6dfedb6bf8342cebbe3c8a0789fddd52fd807f74bcbea19e6539eabe3a7238e6acf968c800e05c9a10848d66653a
-
Filesize
11KB
MD57429484c7f4c3b8b8a66c86f995e0ccc
SHA128454ac1e7d249a10de0fb4c7e19a1835ce8012f
SHA256d48be9f33e18c4cf2cd6fdcdfa474f870da7c68ce6c8e6f87668bb8c1025b6ea
SHA51281467f02f029f5a963be3557dcf7c9aaa41e87bb83fbd170427ff25382fc23283a4cd27e201ae164bb3e4607b43d9f6894a5cd53066983ba4c593a32355eca4b