Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
bff5591d52effef0a52932c2d4586332.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bff5591d52effef0a52932c2d4586332.html
Resource
win10v2004-20240226-en
General
-
Target
bff5591d52effef0a52932c2d4586332.html
-
Size
7KB
-
MD5
bff5591d52effef0a52932c2d4586332
-
SHA1
38819615aa766236c3c058fcb803dd96476127d5
-
SHA256
cab2508815071b031db3336ebbbae5d2145b50692ca152e06822cb3c16edc6e8
-
SHA512
257d6ac98e9bc90bc4a90b366e1ea4a79bd19c5e1bb087930ee255575b72d248179f53ee0b81e60b26a21de68c3ac2dabca8261c0e0d559320918a8e016db027
-
SSDEEP
192:PWkMxFcfb9ugXM7e91mZ7CwtcZA+Z0m5FbthDlh0/TU:3MxFqpo7awB29fDl6/TU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 452 msedge.exe 452 msedge.exe 4932 identity_helper.exe 4932 identity_helper.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe 4204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 452 wrote to memory of 3088 452 msedge.exe 87 PID 452 wrote to memory of 3088 452 msedge.exe 87 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 2824 452 msedge.exe 88 PID 452 wrote to memory of 1820 452 msedge.exe 89 PID 452 wrote to memory of 1820 452 msedge.exe 89 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90 PID 452 wrote to memory of 3876 452 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bff5591d52effef0a52932c2d4586332.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb439946f8,0x7ffb43994708,0x7ffb439947182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1772 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2231843252883798723,12978493535100517855,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
268B
MD5c69225377352f6d5bf1c32f4a214cd5a
SHA1df581612e145da9b2e06aea572c14b5249b25106
SHA25687b791f9aa45cffec2e02af1114ae7f22b2a1719e2b3d928916331a5e31ae62d
SHA512c0102edadac0e7cdb5145a465f88869675eb8bd1d001a3c2d2b9e55c7d047b059fcf83c5f43622d3ae9efd09ac01840a65b96c5772e00839b233226e13d0cef2
-
Filesize
6KB
MD5aa2b61e40830819327f2a85143071cea
SHA189324f4bfabd7d8cc68fdb5b5f91a45f7e15737d
SHA256ad8fd4af647ac0aa566adf2e758d7c67ea931f6a651a4c756fffb2d26698d47a
SHA51245c2bfd34795432c84034e28882d2631aecc3e20bb1a6109de002f0dca1624af3faa3c165cd69e76329a3c7d0f71497520b2d9a51745141f9eb82417536dc0b1
-
Filesize
6KB
MD524271d3e227f80c48b2d31f0efb56b7d
SHA19fb550221bf863621f0f37dd8d6cbd49ca588ca8
SHA256f77e96ff35e2800b4a4851daed52bd6443cd921c2abd6ad16ebafca06ecb1d91
SHA5124f9ef30442808eef1602581fd81caaec006e9f3c7f25aa5884b3238a9ff81aa3316072c728119e8e03ba6cc75dfeb0b64dcb4f08474152bca5def9d3b0de1aff
-
Filesize
6KB
MD551b404451f53eed4801a74c376dbd879
SHA1b9b8a53dc3d4941b1768f3583bd6b4d383339568
SHA256475f88361a33b9ff2b5125c659a576faccd771b9c33bd7a6bdd248e6b849ae90
SHA512d0ff16d0e333ad1ead809fc2abf890ef68e0939cbaa40d8ac3cf846563cbf652b558a0a8cc31576aa0fc1be7b1ebe60dde6cf92902c87276633db70b4cafd8d9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD585dae29e739ee56c5deb32befb1817a1
SHA18a642de4bb48876fb59c0f86d92e016e84df32d4
SHA256ae32deed7c01ba31bb0f5e0a0f8b3465637ed990acb34308a08daa7a6a4b81fa
SHA5127b40c541d5890bce2e9ead2980e86017514561464d2db47680c3748aec5fd8355eeb78168d955b592ab019a8a232bc1def007807a7edc6b755ac118454473c2d