Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
becb1f177cb051d5d0eaaa5e53698cd5.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
becb1f177cb051d5d0eaaa5e53698cd5.html
Resource
win10v2004-20240226-en
General
-
Target
becb1f177cb051d5d0eaaa5e53698cd5.html
-
Size
51KB
-
MD5
becb1f177cb051d5d0eaaa5e53698cd5
-
SHA1
331a0b6125a2aceaf8430d96d0981c15c2425121
-
SHA256
e54db05aac80bc114cee448f453ccdb5a38eab78b750056d99f249d74754d3d1
-
SHA512
8cfa7c402f9d93c379fc796623392f0930e686dd2f9d986311dcd413d7ecb185fb50e8d66e77555981f67781b2edfeaf8908a96c8c09b04b79a90151c57415b1
-
SSDEEP
1536:/LcCbsTupBdr4fuJHvpiFqVPJevnpZDVk:TcCb9pBd8SQgVRYzDVk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 1476 msedge.exe 1476 msedge.exe 5916 identity_helper.exe 5916 identity_helper.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1420 1476 msedge.exe 88 PID 1476 wrote to memory of 1420 1476 msedge.exe 88 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 1168 1476 msedge.exe 89 PID 1476 wrote to memory of 2032 1476 msedge.exe 90 PID 1476 wrote to memory of 2032 1476 msedge.exe 90 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91 PID 1476 wrote to memory of 2492 1476 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\becb1f177cb051d5d0eaaa5e53698cd5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffb303546f8,0x7ffb30354708,0x7ffb303547182⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:6000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,14640546099126101991,4749984700676273766,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
21KB
MD5d665d41e652d713020dccf0a25a7171a
SHA1d3a4ac6b1f17825c105958e3590cad5e4e7e3a2c
SHA2561af1748db5992e49dca425c2a4978e33860ac81a80ca24e08fd9a6556598f8e4
SHA5125102ad0f2eecfbcba57acf1d51adfc08746785fc68580aefce8e04005faeafecdee4c1460ef7f62d775f8c9fe06afc41c60b768c41b5f7b0315acd45d5995d1c
-
Filesize
44KB
MD515d236690ae6ed6285bc3260340703be
SHA13b8475145f5f25c9b6b93a260b30ada4a4279b76
SHA256bf521348d31946bb4e6d31c338e6efa0961ee907f4f871b1e9781a849dafa792
SHA5122eca25be9587131ba4e4e4fed86283dbab3f959299d79db056619da072788c6480e5244095de5c84a58c40bf1f5b7bc808ec94c84fd7dca99464eba4f511bbd7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD575db1b16b6c3f3210f0dc4e7bb0f4456
SHA157c7b368193f5f2486e69a5fc29baa5ce699eb76
SHA25692309209bbedc4827c167f0368f922136ca2f5d5bd734b6ba1a87ec3dc74255b
SHA512f9b7c086d4e866dec2f1ba3b5c88a4ada30db01bb5cd1739cc54e63dfb0b647cb8e38681655d87a9378be626d508b326e37e44506d7e52e3d8b6c67db198381a
-
Filesize
2KB
MD54ac12b9c18f8e23afb57bfaf6476b3fe
SHA1b2bf14b8552f59108918aa843e7b7c26625a64f6
SHA256a724de8f100eea17197b1b5700e8ea6ba09313e9a56bf8f28801472958606e05
SHA51291135023b5b36527580e8d5e1d69539dea7eb0519e6a9a42245f4ee45c0937e8ec4ada3e8691ba23e20df70b202d9b56426b2f8faa536144ba40926493d2bfeb
-
Filesize
6KB
MD5d18eedf392cb6599d453774ef488b00e
SHA13701b20dcca989377e93d73de6860c7703fffb09
SHA256b0a19b34c5e6b2161c9a4c62c1e650c2995c3474909665f6221060e121fbb6b1
SHA512ec7d39dbca08ef2bfbd94330611a53fba6201f8e513c9e08236314db1a4949078294d92e3ceeb17d53fc664c00d1f21b0c585ddac56936a3539b6ac06e2ba7c0
-
Filesize
6KB
MD52cbcec33ed488ef0e1a50520cc662a6a
SHA1e0a824f3445d2936003760c60c248e3c8b9641ba
SHA2561969a674778750cbb87f860dd0f918b6e76d6a7417757e352a97da9f76a5a0f4
SHA51211c904f772a0d85f37c359411e14b7da05a507f78b1bfff3fe618288195f290d1c3382db741cb79e95a5937de70c100d4ed7806c8334bec6373970befa729337
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD518b4cf3c5b2b91cf13fc14f8f17d0637
SHA1a634eb904b7afa72a99208be89c73622a8a0b40d
SHA25686136bde204333aa2a9879f977aec65d17185a0cf79d2576615e904331293ad0
SHA5120d323d5b0e5e9e0f8ede5e3a71ea7a5a0141b8e8cfe932402d58c0615f2c2dc0ca1da56eb3bb48ca7abe5703bf1918d4ad07352faa1ab78fa1c5e91ce4d30214
-
Filesize
11KB
MD5eca7c99818a4ffe2993b5fa747b982bb
SHA109aa806af7f0e17e43885fefb565696f8a3c39bb
SHA2566b908f81e4e8a07683ef1151bc864e765745b8ed6606673cb3f77f6e5e92e5d1
SHA5123ab4d4934f52481775dc8ace755ed2642c25095acb625437e4b3c8a68fd6e814a12b3e26b84d2f4c9cf343d26775d730c75721e122a2949cc05f9617cec1c881