Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
c4239b3abee06a75f22aeadbc29cd904.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4239b3abee06a75f22aeadbc29cd904.html
Resource
win10v2004-20240226-en
General
-
Target
c4239b3abee06a75f22aeadbc29cd904.html
-
Size
33KB
-
MD5
c4239b3abee06a75f22aeadbc29cd904
-
SHA1
8de346675f899eb07eac4b719461a7465f05815d
-
SHA256
9b4461dc61fef770116120b2dfc0938551b5c111b2e05a4bd8d5bcf73875df99
-
SHA512
f8ecb3c4364ca50f6d7a7aa0be7545d71e0e0f5dca330aa4b3534e8a38a2e1f540ce070edc5a3f3ebd3038a0096f4369b49bd2616c9edc404b3345e3daa825b6
-
SSDEEP
384:0teiOoBubz5tOCpJnIT/NUbYBlmMyLDITPWY/wjelPB1Ikbnw:YppBubtOS4BPw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 380 msedge.exe 380 msedge.exe 2260 msedge.exe 2260 msedge.exe 1192 identity_helper.exe 1192 identity_helper.exe 5260 msedge.exe 5260 msedge.exe 5260 msedge.exe 5260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 624 2260 msedge.exe 89 PID 2260 wrote to memory of 624 2260 msedge.exe 89 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 4076 2260 msedge.exe 90 PID 2260 wrote to memory of 380 2260 msedge.exe 91 PID 2260 wrote to memory of 380 2260 msedge.exe 91 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92 PID 2260 wrote to memory of 1108 2260 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c4239b3abee06a75f22aeadbc29cd904.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fff513146f8,0x7fff51314708,0x7fff513147182⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:82⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10496266332973774060,11909080687030952798,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD545dae55db5f3945c229a688a1be3e38c
SHA1b6c86f87c4beb8249446d76b3c16b32711c8271b
SHA2564abf9ccead56fb45448661c4ce66c2fa7fe21358eeb050dca7ffa7c7e468e245
SHA51203ee7972d0c6c2f6b8f114dd0e9ab96efed903874f963ae9c397691b8aef43a0445593c67d4cdf02bb9d316a17b2657fc9c737d12b80a83228e97fbd77e5a56f
-
Filesize
1KB
MD5440f8423db8c3a05f71cbbd9876b35e5
SHA11c4f4ac09cc515b3c7740f2bb4ab86ed32d1e376
SHA256d70b02bc2bc7f9374324983388888bacd83732b28a2fc6a45d3c228ca1b64312
SHA5129202a80ce9c007421a88fc2c740a69842ff4104ad95b80dddc3353b95d427daa1afd806b498fa6372982503aef23c4db3645b4e4daebfe288bc356e858c35825
-
Filesize
6KB
MD5b7d187b9fc6cb8a8c4cfd9bf3d1cc840
SHA16d9d84006a88c87adaa3321badd73b96e60bd903
SHA256fad2cda2944cfeb72003edb4d0e26fbc829c2a24ecadb211336a6305631424bf
SHA51283bde94c4577b83ec8c943be04a687c49b2133d8c09954c1e55d372434a2baf6dfe992bab70437ceffa587a8d57e2d5b99dac463575de0a19881666d7cc9cd6d
-
Filesize
6KB
MD5151f729be1c746a28658643cbe0cfa41
SHA1de5e9706c36131e193145718e61ade82ad943b8e
SHA2568c92d0200b98227c2973f75097ca47bd5dc3d099ef7d51844a70d410944eb042
SHA512440021ce11fe4c269ceab32dde880e2f18c8a722e16caedb82c10c27b1e0838ee933426b924c4209acbcc5f4cc5a1906aa7fbb10626084e14ceb043a09e09e91
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c15263c35e700971955aa0321fd8860c
SHA18e314f54cf60d5aa513395705a663911f83a86e1
SHA2569b724fe9181bc1cf05e000c92bb45f3e9dfd747efe445bb594b86efca9262b80
SHA51280c5b04146d30e8d334c6fa1643afb558abfd0ca52118afb671befefbdbfdd8989f5fffd2e5da179942201d1a2fc6fc88a92fa37fd448f387dbcc9b2b503ad69