Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
c02f0d8c2d2e2e6e4654369a523f20af.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c02f0d8c2d2e2e6e4654369a523f20af.html
Resource
win10v2004-20240226-en
General
-
Target
c02f0d8c2d2e2e6e4654369a523f20af.html
-
Size
3.5MB
-
MD5
c02f0d8c2d2e2e6e4654369a523f20af
-
SHA1
9c1a0feaa68014eb5abb949b9f0e874a93ccda2a
-
SHA256
0d127baf1583343189d91b381755d2a2fe85777e3eb04d217f75740062e1fd4f
-
SHA512
1f3024aab2ac8f9830fd785a9df7f9819b1353234e40477f736f22653ce3d9530070d27bf734481d5b65bfb75c42693085ecdbfff406cbdf48bb46b9996c0863
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nl9:jvpjte4tT6L9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 1784 msedge.exe 1784 msedge.exe 3240 identity_helper.exe 3240 identity_helper.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 964 1784 msedge.exe 89 PID 1784 wrote to memory of 964 1784 msedge.exe 89 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 4820 1784 msedge.exe 90 PID 1784 wrote to memory of 2400 1784 msedge.exe 91 PID 1784 wrote to memory of 2400 1784 msedge.exe 91 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92 PID 1784 wrote to memory of 336 1784 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c02f0d8c2d2e2e6e4654369a523f20af.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ff8f44846f8,0x7ff8f4484708,0x7ff8f44847182⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16302910838692603661,9362715082536564800,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
894B
MD520da8a107026b4496fce7bcb2f8df7a5
SHA1e7fc7685fe4af6ced8156f39026ceb2436126d8f
SHA2562c0cee83dfd73046e986aa0469d2a0374b4d100e9229567a646cdeba3f8618c3
SHA512040959836760258a8b49316ceef1edf4643e7bd0d1524d2a2b454bbb23f8d539d0d56a49bcef238fea69bad3869c1c834b43cdf6d68124195d77183453f72f0a
-
Filesize
6KB
MD5d386dc0c5b39fa003980445b5a20e11a
SHA15c0d27bd0014def272f6110bcb9cc5166e48b3fc
SHA256563dec8c0c79dd670d5ce8a23f0369a7c26b18a665354bfa1cd351f66e15f0dd
SHA51262f4922b04e83aa642eda265d0ff93bb04f50666ffd632d1c336ceb7bece4cd4a177a97db860713845f106a230aeb80f1f0c097093c0785f3655a9a17289bedd
-
Filesize
6KB
MD548713969c568a76b5b545d5f3e678fa8
SHA19af251b2b8800147498f922372dd3515196867fe
SHA2564353e9213d410d24c7f99ce2d891933771d7f080fabecb555d2cbcb9a5588b5e
SHA51267f415690f0ad2ec0c56ab383326730592dbedc301acadf847319108a5f3b4f2851d63d86c9e30d07d3b5cd65194e61657f1a2c62ca5ebed5ce0ecf534c1fc7c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de435529bbd7e0351b9e4e6519e81a85
SHA12823012cc7cc3a7a1e2c425f2e26aea31c906f56
SHA256dc05858990f20b88dfe5d8450d218c2ffe7315be33bc543ae1b4ddd9d8c92f26
SHA512ac599951f995e21e025b8ad08cb39f93759458c086ed1a20e64b5611005626a74e095317826ad1533ec4005c38f02c2cb91f89bc383d330d367d89170f40cc8d