Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
c4e048cec3b639bbbdd73ef572eb49f7.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4e048cec3b639bbbdd73ef572eb49f7.html
Resource
win10v2004-20240226-en
General
-
Target
c4e048cec3b639bbbdd73ef572eb49f7.html
-
Size
134KB
-
MD5
c4e048cec3b639bbbdd73ef572eb49f7
-
SHA1
793f7ed9a08644f63354f9fa7f41e4678dea69f4
-
SHA256
6c54f513dde171c3d4ac366d479f9de4c672da9c8fb4e808664fbb59fcdaab3c
-
SHA512
1f7cf66c5e698c1ef65e4909256d6c09f8b14ed5e6624d49e38d7b8857f617b9fce0d820ea63625c0d7fc5a4dd627165352f2cd781a675f0b3b764cfed7c1c14
-
SSDEEP
3072:AuovHXDE7gH/ZoJyC1t8KNhXkllbq6Ju2OvsjySz:ETE7gHOPt8KNhXkU9s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3008 msedge.exe 3008 msedge.exe 556 identity_helper.exe 556 identity_helper.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1504 3008 msedge.exe 89 PID 3008 wrote to memory of 1504 3008 msedge.exe 89 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 1508 3008 msedge.exe 90 PID 3008 wrote to memory of 3992 3008 msedge.exe 91 PID 3008 wrote to memory of 3992 3008 msedge.exe 91 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92 PID 3008 wrote to memory of 2028 3008 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c4e048cec3b639bbbdd73ef572eb49f7.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2aa446f8,0x7ffb2aa44708,0x7ffb2aa447182⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1812 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10469920083591816641,13587001474408797703,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5b20689e76fbdf90e18522fa7134d43c4
SHA188bdec730cc0dbf47266fe1b204768423b5406d9
SHA2569ac9f0b0c1d5c4880a3128f540549936f37b10df0887cd808cfea5e307968d41
SHA5126dd28a3843bf34199443b5420b354bbf6e2daabe4a16cae3422df6847e4d20f622ca13287c06d194f0c395c471d5b65768cac5aaf397a5c532bc718ce6991321
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5decee39859248bf499ad305231286326
SHA122a9ee4b4b001cfb28bdf15cc75a6cf47b06233c
SHA25646d02fe71c9c265ac2c85427f1eabce92381d918984e49bbb99f0e40dd36ddd2
SHA512f319bfdab9307128b109880417e9a00f8ae479f7d212cb7cdea539cad38c491368c5b2e5a2cba21308ee6ea4d54ababb0fe6c0eb247f0f3e5e91a4774b667816
-
Filesize
1KB
MD589d84d5307cdc20eb626400f80ff358b
SHA19a51a1f022cbc55749f62132146ccd48571c6a3e
SHA2566bf0da724e4fb33e4a7a2f1e0b81fe0645e36d775e117fa97f61bdd2640d993b
SHA51213f05ca914a889d2aeb959b6b5edd108711c1c07b0d849e67eceb22cb58d1aa0b14300c3cd5bb68c5601949f7830c17408c6674a5f4c56f94eeb3cff8d96acc7
-
Filesize
7KB
MD5713eb15657b0d9f9f0235150b29c805e
SHA1aeba51aa51ef9e3c167663fd9ea304ba729ca9d5
SHA25635437e5bf8b7af28272aa5d56b85e0210561832f7a4465016da35011b9344d86
SHA512d96c50aec9dc648649fa88f468afb1d0a5a2fa8add38525708e1f4b2332ede18f97925943497067d34be39d3c82cd864fed8a7ce5c87a93710b3d29701f1ca2e
-
Filesize
6KB
MD5914e545d28d5f119369f56559fbdd4d8
SHA10b6e462ab096eef14929cd84b7f4fbbbd58eb8e3
SHA256284894b2476c6eda7201631aad91162d5fd1fb3927c0b3e4ea2beec31281b560
SHA512aa488ba5dc3c4e8ac8ee458f608e63b50f82e4dab552256fb126ad276522c2f7dbfb3ce050a1d131ed2bc4ff341a923e1ea02f56807e6974201d355390b9fa68
-
Filesize
7KB
MD59b07739b1661ebf6d2da60c6d44a32c6
SHA132db2f020836dc70d83e25f59569e0ab6b7bb031
SHA2569a30326ebea2a1d9916f99525f546b48616fc13c4661909caf10d8a885e1f805
SHA51238bff147ed14f9c9d56691580c355990d9e5646813e7de6ea1b737f7071c1b84bcf6bc035e944082622c562d9c41b2e494a3e231ec6b92ed7a480b263391c635
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389