Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
en-us.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
en-us.html
Resource
win10v2004-20240226-en
General
-
Target
en-us.html
-
Size
5KB
-
MD5
10c480c3a146f977ea791a9712fa3c0d
-
SHA1
12f3a8b3aec7d72420b159edeedfe776e9ed9af7
-
SHA256
86ec8a7f61667fb4df5bed9012bde7b161692384f605d5e97d8c6eec79efbc94
-
SHA512
918b3cbdd83cfb1ad40146af9881ea0804a0dc842eccbcb4b76f182516c47817a7a9e456c6937a0e48fd0c24385f961ffae90a01fb0699c3a25b484eec5e2c07
-
SSDEEP
96:laRg5tgh7hIcghshB9fgT8fc4FxHFjpISFwxRc4jvL/lCClo:laKYBMmlP041j27RcEJZlo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1132 msedge.exe 1132 msedge.exe 4864 msedge.exe 4864 msedge.exe 60 identity_helper.exe 60 identity_helper.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4632 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4632 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3144 4864 msedge.exe 87 PID 4864 wrote to memory of 3144 4864 msedge.exe 87 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1484 4864 msedge.exe 88 PID 4864 wrote to memory of 1132 4864 msedge.exe 89 PID 4864 wrote to memory of 1132 4864 msedge.exe 89 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90 PID 4864 wrote to memory of 4504 4864 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\en-us.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff25ee46f8,0x7fff25ee4708,0x7fff25ee47182⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1696 /prefetch:12⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,13286019985128630951,14057908322795945355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5460 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x410 0x4ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD5ccf1fef433057da45f8f97c88a87e6a7
SHA1e219ebc34aa2ed3f0a21ecb57760607432a25264
SHA256fe58f1db0a6fbc284d3e0ba8027c9cf8f73b1c3be01784c0c6cec0546ca0360f
SHA512252b6298f0b5e612a307f1214691418a01e8f20f276893c90d4af946442221a5e3bdbe0e6948f1a64d4cf1de8089347253e747f8c17f13d15ae5deec1db29865
-
Filesize
6KB
MD54dfb0f7cebcfa7255b67df06c68f92a6
SHA117b382dbf95f605ab85e500e2dc7959846cd88f9
SHA256b5e574d0c522b4cd247496a1a3f81711e3800d8dd0f7d303ffc4f87ab45cf428
SHA512264ae0726ae24811802dcf4e1a11c1c27af891f6b4480a455837dadb86b75e145f568a1ad63feaf723167e481a197594fed006dcadba56e5c244219c67a10acd
-
Filesize
6KB
MD5f94c7d3b71ae9734fe81841d691af3ab
SHA1146dbd5804abaa4e14d55c3298bde0e0fd37b995
SHA256c4b134d61bcd4b45bb399dc5ec3b9bc9c70f4a990b2936478f362831bd33946a
SHA512327b24a69454a88a454d29975721554571b978161199c76d1517b246d1d6596d9107b51fe3b517ee0ca792b788d5085a137aa1a58834f383e9938a173e94aa89
-
Filesize
6KB
MD53fd0dcf90ea8a458cce8ffe60c1e0d81
SHA1e0386f5f98dcb6acba3359110dc5c84a38e6fcbb
SHA2560f73fe15e6445a246f2410419a55d7487f93d76029621e771ccdfe3b8eaf6f14
SHA512ccd02c4bc3b26ccb7a2f459f6e6943accd365a400ecb961e5efe930418a275d22b0c7e62386d86b16c2c3d8efebe13f4a8098d4f8ceeb495096e5273863ba563
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5612c9374ef2af70b552071521d2254c3
SHA1036d08845fdd6828fedfed79eec4d2e8d7730475
SHA2562ca85928aabaf8f6217ddda6a5a28367176b56962f3a1abee48be120baf6bf0c
SHA51245d8d26a2f6202dbdc3a16713a41f988ffd0e7da9cf50d37a6d3322b019bedd590dba0423dd5521de67b43d62b39ad1e1af6e2abd58a27756a840f05f9699ca9