Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 06:49
Static task
static1
Behavioral task
behavioral1
Sample
c2b848a63bc13a977472c033e53bedb2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2b848a63bc13a977472c033e53bedb2.html
Resource
win10v2004-20240226-en
General
-
Target
c2b848a63bc13a977472c033e53bedb2.html
-
Size
90KB
-
MD5
c2b848a63bc13a977472c033e53bedb2
-
SHA1
46190dfc20e806a8a694e52a4db849ad3a7ca5de
-
SHA256
e1c481eab6722306f0f8a05eb164bb416d4877e40f25cda275c72bf56e2a8535
-
SHA512
00ed20512d3ec092412ca195d1edf2401bf2d644e462a47c16e58dfba0fdf10079e618730fa356e97c4682702de1bcd4d0f0da98879ba395dffcd133414035ec
-
SSDEEP
1536:gQZBCCOd90IxCg0Pr1rkw/MY7QP24KwgYgRZtG2vmQryIA5oN7LNWeNvI58ttjkz:gk2P0Ix0ePd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 5224 identity_helper.exe 5224 identity_helper.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1524 1688 msedge.exe 89 PID 1688 wrote to memory of 1524 1688 msedge.exe 89 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 4464 1688 msedge.exe 90 PID 1688 wrote to memory of 5000 1688 msedge.exe 91 PID 1688 wrote to memory of 5000 1688 msedge.exe 91 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92 PID 1688 wrote to memory of 3988 1688 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c2b848a63bc13a977472c033e53bedb2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaad6146f8,0x7ffaad614708,0x7ffaad6147182⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 /prefetch:82⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:5580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,14888521230298660169,9142629572996359047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD528f55033080b3d0763a697a1f08ba9fc
SHA190970d65e726fb5637bbd26634f2a1109e47332e
SHA2560a6454421c47cfc283d76ddb3e9aa0b1e70155eaefe9e7293182c3b7d58425ee
SHA5126c5168e8feb4696f683e4ca8e4ae8e47b1b60ee446e3290efac43734f20a279606ad1969e664c80378f0866f52b7eed92542eaed4df3554b63af57af11198016
-
Filesize
1KB
MD5c95e570df1dfb8bbffe746490775d644
SHA130897d50edf5fd4840b9b19dfcffe4dff6382110
SHA2566a8fcdd351a04d7225fe159475d8a19b2041b62c2bc12fbd845c042ef24b2fb1
SHA512f74d2b1355e7cc3cc1a451fcd2cb10b2be21aae701af4bbe233c6ab6f704913ac887ab31cfd8ad9ecf67ce2072f04827206b936969f7351f235080fa8e55abc0
-
Filesize
6KB
MD5fecf26b393216e2156b800aa324efa64
SHA17f3f6f0d6b96f5cd4a808656900a69661a1a6aba
SHA256b59dad71ae093f7a1c6ad75d2d99058760a50193574865055088cd73c506acd7
SHA512815881c512f9697b26ce42fc5849515f4bd582390653d93913ca2c8fdcbdb2cc2f6e5e5d35d69d37c9ff71ca2c8833c3f36fffe0266969ba999028a65faa92e1
-
Filesize
6KB
MD5cb5df57e7a3812d831b53694f78feb64
SHA113ca4a0042165f455f479b0d2dd6d7e3d45aedc9
SHA256a53b0d6c5e055dccde80633eebfabc5e66fe5f8b7d7a3f9552279add8f6fb02b
SHA5126438f0f38ab446d8a70ea33772a8b7885d6f782b03aae738089a529bbf9152138e5f634f16e52195c2b4736535a172d092f7fe722628df130ae32830d3827844
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50e62e0cb82a0a41064804c43dc052f81
SHA12431a4dc5f18db9bbc360a548c12fe28f97806a8
SHA256420991654544482696e0f2fa9fdbb13249b1d84ff6662f86f4378409c6c349d7
SHA5129dd4859a656674c42b2ced8bc3b72cd269975776ee71976fba6e4bbef1e21c5617fcbfdac6ee215b3fac31e5f154b176f1e8a3f60cd0caa139891fa32c82cef8