Analysis
-
max time kernel
162s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
c706a3b42aec6e517804795870807869.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c706a3b42aec6e517804795870807869.html
Resource
win10v2004-20240226-en
General
-
Target
c706a3b42aec6e517804795870807869.html
-
Size
19KB
-
MD5
c706a3b42aec6e517804795870807869
-
SHA1
db74a316e72e3360fd4b490e840f1a77ec98fa48
-
SHA256
d1c3b63808281b03520908f1d91a0f7fffb96b3f4872f53849752247d803d3c1
-
SHA512
94784225ac998b13f760ae2ae0ca4d8a16af36c334742fc40d3956f4112305c3b35ae587498c836a81cf5d5944d2d7533c428e8daa5e0abf816d366b11a66770
-
SSDEEP
384:/3/qCt63HNil9YI0QueE5bi0/g2cLkTY3:/3/q13HNil9YTniWY3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 1820 msedge.exe 1820 msedge.exe 1656 identity_helper.exe 1656 identity_helper.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2156 1820 msedge.exe 83 PID 1820 wrote to memory of 2156 1820 msedge.exe 83 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 4652 1820 msedge.exe 88 PID 1820 wrote to memory of 2112 1820 msedge.exe 89 PID 1820 wrote to memory of 2112 1820 msedge.exe 89 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90 PID 1820 wrote to memory of 468 1820 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c706a3b42aec6e517804795870807869.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0x80,0x114,0x7ffd5a4546f8,0x7ffd5a454708,0x7ffd5a4547182⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1692 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7870938818038680081,4167139321237115800,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD513b49a58bc17e2de2bc2cc0a9b2e5be6
SHA129e2ea84106db704a26fbca61f963fcc4e92afd4
SHA256f7c6fb44ddbd2920740a69363f6f879004a3d0464b5ca0aae76b16628ebd51da
SHA512d003eb235b45cde57074ce5f9a384c7f0f75d82adb33e0f04c6589785abb8fd63efc15ec92dc00fe1fef128b30887f5a312ce0498981f270cc632797ea80fded
-
Filesize
1KB
MD52944cd66c88844d4f21892a47e98f663
SHA169c386e16204e816c59ce5f97c3f1796638ad283
SHA256a191ceae11bfd1842d92b4817fd4e62ecd19eb4ff0b7bb48ac432d97c624220a
SHA5128820d56cc7a9e5660bdf4650201a718a72d72a7db9f4a70793b6a38aefc55b87243bd3a3f538d18d69953b4324860448f0718d41c504b9b287f5867249d4a31e
-
Filesize
661B
MD53fd367a44f818349895a7e2e65e884b9
SHA17ccdd0e6008ce9e4b735b147d3ed8388f802dd65
SHA256b13387cf2a8ef0cea650ca0bf6a81ec9302d714b994042164b3c3e250feb8a5d
SHA512013e527d4158ef86a5991c71381f1b812aec3f380d1d25db680ea7014a5f86e0b5365d22d02fd16e7b8d2aab86ec091e8dc7baecbd5d884e49937c749eca0165
-
Filesize
6KB
MD5a3d1fb867e71cdcfbd00325cfa6f2ac8
SHA1ab6d630a3ef1a5e002351e9c1df78f578b11aae9
SHA256a4c4a0e3d7a93461c5ff7adfd0f400dd0cc48a22efb26078f6150cc0e715a777
SHA512274a82f8af911c97a77377f5b2589e2415961daa73a01e3be23a99b96cc14d294fbead2de356db77417c03164e73fb1a7b099a5f524cdb66bc03f7b345631376
-
Filesize
6KB
MD525f1ee9a33363100c05cd3629322a89a
SHA19d72330790c7ebc615a2c82ca2b88f6ac219659a
SHA25652b6b55c6d6ee2e52917b64306198624ab635152eeb84a3ba1316d4d0856cc9e
SHA512d4ed25997b4bc73be6377a38b3d5437fd0be5f1ce9f3db105ca1bfc93916173346a39f2d63c29012228eb0049f7d4d9dbc4eaa5d097cf369d3e2beb6d5a42828
-
Filesize
6KB
MD5bace3fcb9c0b79e924ca596f912c79f8
SHA16835d9659a8d3b9b7b85da0f34261b42a2158b94
SHA2567a21718a08953c47918d6f9544b4a9eb3f2c15546d68b94f5ad66ccd097cf863
SHA512a574e29acbe366e460c2cc3e5252150887b6ead6f5cd783b61d87a0b3d498d92a0cb2b004530d731a7f86e659c3884f1d98be262098d93ceb041b55ff068e708
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c076087ea3c2fed75973f35c857f6a00
SHA1f893d533ca55b12710f6f72e2c5893532a6510e9
SHA256085789f5cf19e4454373cad057807e2bace968d636f71c92b39ff682ab5ffb91
SHA5122d70b4d525111a312576fce7af85f9e91f88a15d24cd45b5a86d340845f5bfec28c7bd9ba5eaf401ba66b26c7c394fad6947010f4e674f2d789c11be4d3d5482