Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
c45f0e1867bb9c7b93cc7945363422ae.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c45f0e1867bb9c7b93cc7945363422ae.html
Resource
win10v2004-20240226-en
General
-
Target
c45f0e1867bb9c7b93cc7945363422ae.html
-
Size
3.5MB
-
MD5
c45f0e1867bb9c7b93cc7945363422ae
-
SHA1
a9b1f2c6eb09771be15be4d67fe9448168b95b8c
-
SHA256
ce0b01bbe2667d4da3b7d25f9f9f58c135a2646e56f90135c3cf7d437b02e495
-
SHA512
d4bc79d0add2500835d436f224cc03575ecde58cdf1c7a87101a562f662d47e77847e54dde6ec2bf7c66fdae00a7bda33f433c5bbabbac028392ebdc9c84946d
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nyi:jvpjte4tT6si
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 1452 msedge.exe 1452 msedge.exe 2280 identity_helper.exe 2280 identity_helper.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 4264 1452 msedge.exe 86 PID 1452 wrote to memory of 4264 1452 msedge.exe 86 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2936 1452 msedge.exe 88 PID 1452 wrote to memory of 2112 1452 msedge.exe 89 PID 1452 wrote to memory of 2112 1452 msedge.exe 89 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90 PID 1452 wrote to memory of 2288 1452 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c45f0e1867bb9c7b93cc7945363422ae.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2a6746f8,0x7ffc2a674708,0x7ffc2a6747182⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10766838864270202192,1910292663647873340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
981B
MD58ac4db44edf808a6fdc3ecd0c81de1cf
SHA1f662ef8734033c32ea622d6455cbaa2b7253266e
SHA2563041e2bf8c84415563ad5979bb9a4fec9cc778a1e1201db1d6d65e324b4d3c43
SHA512c1b7672d8d27e0514e4422a1ce4d8d8ec3b9b9d0ce55a21b39847d3226128911bd1ff4c6ddc72eb04ccbfcca6b82471de8ea6208f63fd0f7ea8c3a97b9ceaa65
-
Filesize
6KB
MD5363f552572df47cab3dc2580274ba53f
SHA1946bc469c1320f38b1bd0dcf34b5b6a12af577fb
SHA25656a493038cec1a4d60e26ca0998d1b75f4c4fe2a1bcd88bbde10c989cfad3276
SHA5126bc4259a2453e4c32a1dc9db5f6779a159cd39e497ce5b28e6cff6a8a2fb06460390fe9fedd11508ed8e8e324e006f059ad1017abdad806ba535a594086d62b0
-
Filesize
6KB
MD5dfa2bbe762002563c1221503951b9876
SHA192262fc5bf6110e01a9f9a68552eaf026e3eecc3
SHA256ccb8bd04a4d034c73b2c64efbc8bb04dd7b124a90d2909ea2a0b81811e935c6f
SHA5122c9ff0ae9074bff20b891fdd61a621790a3f61cd72e3a6343701c68b95c0a0348defa4706e6678f7735d0f4bc1da052c846b9fbbca3b1f7d12cc863a9251c396
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50b491ea679dfc1265afd48e64fa4c41b
SHA1ca949c505166a9d96f6a9550f76d321e3966845c
SHA256a3d25d30897c85cfe0abbc9d1d45e5848863631c6b9fafcace9610a1a8ba5136
SHA51288ccca940560f9d3051fafe56ae28d7a8067ba8ae944ef85b91c4a2fdf8c9c64b14554a7c00c5f2275090e5ed7824021871aee2f34578176fcd1b3d941e6c0bd