Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
c40919422df13109733cfa0adfc51280.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c40919422df13109733cfa0adfc51280.html
Resource
win10v2004-20240226-en
General
-
Target
c40919422df13109733cfa0adfc51280.html
-
Size
117KB
-
MD5
c40919422df13109733cfa0adfc51280
-
SHA1
4deee12a006296f8806e47e9415f9c31bce78289
-
SHA256
ef55bead2de989f02e0d1893e562316dcaa4a3e0f1f4dec27e90f08406de28f6
-
SHA512
65f3085fd8d33672b178c98337290664df2ef6fdf7d7b1a269a057e64e7da166d381ef09c82a7a89d85f3041947f36e302026fffc1393a20cbc946a6701b10e8
-
SSDEEP
1536:r7JfOAFJ44cC8/ABtxqg6VUVntIYrKIaGJwQ84cx7mtiV6nPot9v:kZC0dgPN8v
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 4708 msedge.exe 4708 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 4228 2744 msedge.exe 87 PID 2744 wrote to memory of 4228 2744 msedge.exe 87 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 1540 2744 msedge.exe 89 PID 2744 wrote to memory of 4708 2744 msedge.exe 90 PID 2744 wrote to memory of 4708 2744 msedge.exe 90 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91 PID 2744 wrote to memory of 4272 2744 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c40919422df13109733cfa0adfc51280.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa143346f8,0x7ffa14334708,0x7ffa143347182⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,6959744317223474482,11357912244928654358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
6KB
MD5b820727b7a7f3ae55c39fd59728b1345
SHA1897eeac0f7284d92b2554dc95a57f2b3c4499129
SHA2562e9cec6837b27eacd5ab509947e7542ccf9ca19093dd53de1ff3d45565de08a7
SHA512c10559e281ebeb996f562a3d5f8a1bc70af7333988515c2998d7a75564157333d5d75c2b0b51f6966899108e3220ed98a57872bf11484c14cda560e7257f7ead
-
Filesize
6KB
MD5c73024f597611119381aabd909e5c904
SHA18742eaa8ab36f3538716f7d83920e0c58f5b1c36
SHA2565bdf9029f354295b4f7fa572440b40dc590ea8fb27e20f76137d0b1588555839
SHA5123a2d83fa96efed6658ae42e7ef44cf248958bf4354616b7fff437c6e6874ac4474644b5fb6a8b49183cb2b1a8ab0c56bfc9cb2f60f616dbacca607cb8df31fe2
-
Filesize
11KB
MD56f4521dd841c790ed60b41bf5f2d6f39
SHA17262bf71e61fe6da1c7480f6b1d2b327f95e2266
SHA2565a40ccbfda13b3d56b2885bfb1ebfc5a36dda9c654a0ad24d72d34396245ee02
SHA512b03c8722fb94e23efbc1f55ec1cbd0d6c5f7fd02e8afdb5ffb5beeaaf74b45983fbaace14f6cd7c12e3cb40d93d588c5a75c18bc61d5202889a152f95a799ac9