Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 15:43
Static task
static1
Behavioral task
behavioral1
Sample
befcf84baa41b4cb307a5c61a944a64b.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
befcf84baa41b4cb307a5c61a944a64b.html
Resource
win10v2004-20240226-en
General
-
Target
befcf84baa41b4cb307a5c61a944a64b.html
-
Size
46KB
-
MD5
befcf84baa41b4cb307a5c61a944a64b
-
SHA1
3a284fc7fac3a7c8932a5ba93dafb4491401a913
-
SHA256
9c18752fbb2b27a46feb2cc10b6f4c52c984eea87f3faa593acc84742c65e1b9
-
SHA512
6ffefc93f59a9f01f114eb8ca5bcf825a7320162f12f825c3c37d35dc2292708e211da4ddc988063aaa7c1e16b27f74b8004d89b9ea9aaa77c893bd411562cea
-
SSDEEP
768:1LBY1pIzQBI7qreEKiE6oiz/45w0KXkIjEclhybUnZrcJPOvjeqDr1avst:1IIzd7qiEHnkmh7nZrcJWvj9t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 2228 msedge.exe 2228 msedge.exe 4076 identity_helper.exe 4076 identity_helper.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 716 2228 msedge.exe 88 PID 2228 wrote to memory of 716 2228 msedge.exe 88 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 2000 2228 msedge.exe 89 PID 2228 wrote to memory of 3904 2228 msedge.exe 90 PID 2228 wrote to memory of 3904 2228 msedge.exe 90 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91 PID 2228 wrote to memory of 3184 2228 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\befcf84baa41b4cb307a5c61a944a64b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fff6f4346f8,0x7fff6f434708,0x7fff6f4347182⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,3360191274098815386,4841500479920319944,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5872a39a64ab4c4cccce53352f155bd44
SHA1d679d8e5d7776bb3384185c26ae28b58dbfbb943
SHA2563fb09ec690d7345fc251bdc3b9639ebe858a6df490ad8e8e4f48a7cc5751b01e
SHA5124ca79ac7ca4a7a697d84a94196f35dc8a5cbd7fcde0672069ba9740674ae938f69d1a3c913927d0228f5ae69de80f1a898052e2bfee9b7ee06437d14bdc00215
-
Filesize
1KB
MD519872ba0b6e972c343921b62b80008c4
SHA162794cfa33e2e69772fe33c49b9a05ee3b0c124f
SHA256f38fcdeec0550311eee901340beb0807e5bbf432aad978d405581761895dab02
SHA512b7a5ccf717bda5a6aee7bbe664191a9dd79275576e7afb5f6ec0c6a0bc266b185c268d20a9893e1b1234c6706b03e67639a82e7921f54c9fda03cf43fc7531c8
-
Filesize
6KB
MD5af7c2d2e03e71db8717e47ead3b75a76
SHA1502a625d42e38a250dbf4f7e1e299f28cee24612
SHA256704947b1389b11b074f0894f607678013637186626905bd309510756196845be
SHA512f6cfe584122ef6546bc262ef48e52dd0dc7801a3db17f20c572dce639ccba4e08f319b1c34fbb6fc2220191b6857a40d8f582e68ce25585156f80a0d96d37262
-
Filesize
6KB
MD536f943c95dfe6b45c621907f96389a08
SHA1b70a4b61993a8aca9a2d595466402f84d02905cb
SHA256288cfa8bc7245a4daa87d92c6150f94640eb5ddbaaa911657eb0bd0645c054a6
SHA5123b86e3543f2c865b4a313ef7bf6b52b1e00c78dc29ecb7b2bf37ac648fd49bc0f790ab70da9d4d4e57c1554ad38d704084c663e97587e24a812dc52ff6a7b390
-
Filesize
6KB
MD5a037aceff61a92ffdbbe857aed909767
SHA1ea5676ab30c08bb6f55bbb778ab679d8a2a023c3
SHA256f0846b5c2e598b387081246a73b52126fd685d3cf2b56f4567ededa117c16cde
SHA5127ded40265933177e735f8680545859290a0fe1a2e51c8619658f9ddbfc7104372d84731374504af107d46bf3f8e6e00e29f12c4069f0bc830750ad1846564515
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56e0bbd5a40d558892629dcffa2ee4f83
SHA15aaec257c86f40583845320ca1e0ad7067deef81
SHA25632ae93c49fa79b4fbfc766368411d7abeb89a9097e0ac5ba9b3523219ca0a77c
SHA512eca7630bf5a275f15eec7f8d574f4423942decb3bb7f2e73d1729bd78cdca98ffa4ec01e521e9f1de8b1b8ac6f80bde40814ec66218794430dd1b1896d6230f0