Analysis
-
max time kernel
164s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
c4c65e430bd434937418c2c7a4045e9d.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4c65e430bd434937418c2c7a4045e9d.html
Resource
win10v2004-20240226-en
General
-
Target
c4c65e430bd434937418c2c7a4045e9d.html
-
Size
4KB
-
MD5
c4c65e430bd434937418c2c7a4045e9d
-
SHA1
74f5d8fc59b402f03249770c67dffb7de2020982
-
SHA256
feda099b111196e3558b803ffca87ddc550d40941f9ccafd3a6ea7ebc0c0d32b
-
SHA512
6c7d26dc8f138a5ef7bef89ab29a82953cab5b105307b38b5090d8fad81c558e74e0ce8be7c99de4579bd65e112921c2722c4f26abf074f173d6be3300a82531
-
SSDEEP
96:7oCijdR2btXadqb4OZ4O3ryFfLfT32dddkdddedddwH3HfbGDmpBqEyf6u:U1d4bAIxOlDTOV56u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 4820 msedge.exe 4820 msedge.exe 1668 identity_helper.exe 1668 identity_helper.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4388 4820 msedge.exe 88 PID 4820 wrote to memory of 4388 4820 msedge.exe 88 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 3224 4820 msedge.exe 89 PID 4820 wrote to memory of 2328 4820 msedge.exe 90 PID 4820 wrote to memory of 2328 4820 msedge.exe 90 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91 PID 4820 wrote to memory of 4552 4820 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c4c65e430bd434937418c2c7a4045e9d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98d4246f8,0x7ff98d424708,0x7ff98d4247182⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6856693739191894613,3971852345073273167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
6KB
MD5db2b242c5bfbc93ad96222ac421ff7bc
SHA10fd7692fd5122f16c3d29f4e05acf9ecd6df1e29
SHA256b50b0f47204b259164922844f51c1630e57328000e7a9b180c774c9665c00ab3
SHA5124808b37e5268916cad3de6749695ca68b999ef03be7944008187f0a1a368650b0e0f005c141342cd854e53b441ea7d75e1d22e7c80d4c6a5db493f71f5cf59e0
-
Filesize
6KB
MD526a21fc1281b2b671201ba979f23c936
SHA185a0e800a0f961144a5673ff7a76c0ec00c4a415
SHA256d776c407ac6f2c2a66587e9d6fe01e1c7bcc1e865c1417a11908b816d135a1f7
SHA5123612454f6c02e486db6fe26c35c27c69fac8c6a69eb2dd7d214c1d618435a68eccb2cb57026ff5bdac85b3db106475d29b385e5e9c03908592b7a5e810d972be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5d8dddad8906fd14df82a92a59b6c7275
SHA181e2d376be49461039dc2b6277bdfcbf19a9c066
SHA256f338442343a07c7d60f7870643fe6601dab9b1555ad70085cfcc1980d636f306
SHA5129ee05948ec30b6e2395d16ab15a08dd8c05979eadddf291d3d263a82dc3e122d2c6d894ed890dacd004719a3ea8ac1684eae32ef0ea94945cc06047923df2f53