Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
be0b2abe25e74c75bcb2ff890b9031c3.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be0b2abe25e74c75bcb2ff890b9031c3.html
Resource
win10v2004-20240226-en
General
-
Target
be0b2abe25e74c75bcb2ff890b9031c3.html
-
Size
22KB
-
MD5
be0b2abe25e74c75bcb2ff890b9031c3
-
SHA1
7e7ee2bb124eb17978fc01122c4e3044c1abfa47
-
SHA256
31b7bb61009bac6bfa52f4a9e488626ca63d9ee2a28f3f9f81680eaf4ac59493
-
SHA512
82ef0713b793b3681e16e03bfcf59b0d0aa79549620b9a2f74061fd3c1356d3cf48e1d75e4032794718ffdea8817914d38d3b9d7ab216d040b00ea162be6a695
-
SSDEEP
384:GRZ5gQHuYPLKMOwWhdW66nz6z0I9aHW66dDmDfwm9aHW66YvP3wbpu9aHCNiKevV:GRZIW4cCAL4tEB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 2420 msedge.exe 2420 msedge.exe 4416 identity_helper.exe 4416 identity_helper.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4616 2420 msedge.exe 87 PID 2420 wrote to memory of 4616 2420 msedge.exe 87 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 220 2420 msedge.exe 88 PID 2420 wrote to memory of 4836 2420 msedge.exe 89 PID 2420 wrote to memory of 4836 2420 msedge.exe 89 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90 PID 2420 wrote to memory of 3544 2420 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\be0b2abe25e74c75bcb2ff890b9031c3.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb89046f8,0x7ffdb8904708,0x7ffdb89047182⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,10617768253434477929,15297430330597629100,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\223822ea-388c-4005-9098-e2c08c18c841.tmp
Filesize6KB
MD584143f10d53d961fd593021a36f93f75
SHA10d05e588d0c14e368111b583aef0ab8b03c39c23
SHA256af86cef6481909b385f0d4ac8a702d5e94384f3e35c9952292ac30b591fd6a76
SHA5129d61445b0b0b2de572392fd29ecc152230aff8d34c6b0a13f14e98ad8c2bbc7bf3081103492d245f82faf3aa5404d98e891195f95b71bcbfd925eb67666ad226
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
188B
MD5c4700a9734c6414b1f3f0f5a935ce87f
SHA16097ef5fd878ada701a94ce04283b0a39435be93
SHA2568337c2128914f4bab0750cd2b5eb2256535326ea2a1f2182b233f58a968db441
SHA51243f72edcd48130e986b1241fe45285fb51d2a68269844ce1dcbeaf79d2e4df6647ab98080922d381711c35f0e41d611b7cdd18d90c6dffebae00d22973265c49
-
Filesize
6KB
MD5516610d7db0bed4456d67262691c2ee6
SHA1de472211eeb691dd3781926369e498a86785eb07
SHA25681c01fed8efedf823feb93b92736c7f92e2972629b87bb6c3d027511fc5a8fa9
SHA51259d58397de005b872b771696c34ac9e070cd4796e8742f2a87a86294565d11f8a87931748b36b16c2c10067c3f778a02e8dae6811e92f132122f4184a0821ebf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56913a7a7151905729659a98092d5c80d
SHA13161e5ff42b6d775c8a573bfa7925468025bfc30
SHA25693386723b58f8961e09b107c9ed53aed59da34b36a2dd427ed75251f1476d158
SHA5127269cd1d99a8c55bf3073114ae98cb9c0173c9c84ba3ef53fde8abfdfa5af15b820934d6f0159183e50488048011a84554c55f89d0aa6d0d5301b23952c770a5