Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
c32535a800f45847339afc08e52edd95.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c32535a800f45847339afc08e52edd95.html
Resource
win10v2004-20240226-en
General
-
Target
c32535a800f45847339afc08e52edd95.html
-
Size
16KB
-
MD5
c32535a800f45847339afc08e52edd95
-
SHA1
9085ec13842ebf473565d03422ef052d0da4175e
-
SHA256
832a298d2dfa42da0a132d051335575515c0469ae27e837cf2547937a72c9637
-
SHA512
56fc200d6e17670d6c5daa682dab902992b508397f9e9e3d9d4a22fc4596414c17d2ff6a6e7f4ca18b9858be224bdcee3d9b7d7fab74cf4ff7c404e8219e163a
-
SSDEEP
192:F1CyTW76IaJmKRAsHbHIoSlc7d2OG+oAczC7nz+wMruBhtDtDtJn6pbyjLoddW4V:F1DRX9dw+i2Odfcexxup4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 4192 msedge.exe 4192 msedge.exe 2928 identity_helper.exe 2928 identity_helper.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4636 4192 msedge.exe 84 PID 4192 wrote to memory of 4636 4192 msedge.exe 84 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 1612 4192 msedge.exe 89 PID 4192 wrote to memory of 2744 4192 msedge.exe 90 PID 4192 wrote to memory of 2744 4192 msedge.exe 90 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91 PID 4192 wrote to memory of 5020 4192 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c32535a800f45847339afc08e52edd95.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff980ab46f8,0x7ff980ab4708,0x7ff980ab47182⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:82⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16336803524654575428,48995712315136774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
421B
MD5e55de585829c043b46bc188e22c1230b
SHA1fb39a02fbf0bbaae5817c704fd0557b9aed49c2b
SHA2560c64193e5a344a9e86762c71697f06cc93ab7312aaa77d919ce5f6a0b4588c02
SHA512cd2b5afef1f5f6747d820c313c0e9ad461d73ee970978ba3f61620b630ab88504cc5f56aa6534cdffc49936b627ff0efb81b6d720bf3ba6f31d1933799367acd
-
Filesize
6KB
MD519182174f6f2b7f5e7196193fe8b23a8
SHA171c09732fa08b539df54805e7af5fb710b71cf40
SHA256b2d2ae372bf3746dac9eb86041df1c08181307c73879194e7924e4385f34eee1
SHA51230170c11f5c60b5e71e30e22adf934ff79ffd19280bf23b1bc6bcd277f50f9a803a3358102556c39210e65e64ea97b87d4c25badb4883647e79f61626a24912d
-
Filesize
6KB
MD5f2838c1f0fe700a1adacd8a021096ab1
SHA1ff1ed982ffe3fcbc9ca890fe12bba12a01f0699a
SHA256fdd6363eed963be4ea3fdac0f7d13ec719a662d32e0cc1d46a2738b5aae1d563
SHA5121ee92d7e4b9744bd5ca8990f9450fc825f82fb0592fa59f17a934174cd4e28f0730775960ad7d9404d84dadc32e46b3fec8b3c4d575f321903a18d5b7c9a8db9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56bc2c8fcbeca2dd6106438a44093410d
SHA16316cb86f12dfd31de5f02f849c71c44c86bee52
SHA2567580080b777605210b34f2e1fee012605186408409d63a5076c5a05e03412f03
SHA5127acf0a966f8160895fb6412da796fb0ca54194e246480f082764689a7a0356f43f781032ea7c4cc058ed2260668d290c34356e6f442d9b5e3a82748995b471c5