Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 06:38
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240226-en
General
-
Target
sample.html
-
Size
4KB
-
MD5
c37afec807f45a2a95cf932066844c60
-
SHA1
cd3c6175ff88a94e0d44e42a867e6263acc0c3cc
-
SHA256
427efbc733ba83d5f79afa3e6a92a933ba1964b8bba486c500e12796e448df31
-
SHA512
62669d349b40820f6a1d07f1f18d5df234c95946e44835815498650e8dc3acade1a244502a7b6b9a6f2f6553530f9e70e466d1af68f45b38da270723b74b0678
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8kZqXKHvpIkdNZrRB9PaQxJbGD:1j9jhjYj9K/Vo+npaHvFdNZrv9ieJGD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 972 identity_helper.exe 972 identity_helper.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 3752 2628 msedge.exe 86 PID 2628 wrote to memory of 3752 2628 msedge.exe 86 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 1216 2628 msedge.exe 88 PID 2628 wrote to memory of 5024 2628 msedge.exe 89 PID 2628 wrote to memory of 5024 2628 msedge.exe 89 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90 PID 2628 wrote to memory of 4120 2628 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85b2046f8,0x7ff85b204708,0x7ff85b2047182⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1196331581664371406,13738334867653169246,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
6KB
MD5410cca8fdf40c58e288250a0f3e0b088
SHA136f43d94276d7e84dfcfd39dc2564e45cfb811aa
SHA25611858ded05ab5d4a2c2c1bd436fb25f4b89304a4d22d5fdce9c1f69776e8c553
SHA51253a4583339f7aa2b5d70b10df83fc0159035bd0af676ad686ed3f0b3ea3039e65cc587a08ae2b3373fab9d965038701455b249be5e9a04521c7ebc9ddd4b0eaa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a0233cc8-cc33-4a08-9e42-df924c9df765.tmp
Filesize6KB
MD58eb871a490b216f9d4780e0de5c2c27e
SHA1868c66822e075c5c05f5a41a80b4f260d3022b3f
SHA256552a47b31ee1fadde8b7dcdbdbf09f0b1d5053f63a8dbabdff8ca3538f1de45d
SHA5121c71d40918d70531dce3b9d542b31032b0c0c8322837d920b8a6333a721d898666dcabc9eb0ee2e29fce34043b92bade825441754992a7ece16a38bcd84ed870
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD597ab8ec09f2308704fbbac12da1aa6a7
SHA13d4aed53fcc37ab2a8be75a3bf7ee011adb0d7d1
SHA256821967cec1604f19e907e5cbc7207c3e8cf0b50485845adee8731540f11c80b2
SHA512bfc0ad8b47108d0918968c10ae478475582ebb2333db9eab7900a5684ed2e4391f3f3f94fa19d2841b15e716ac8bed18b9e94b75935528416e2c94bd551dc0e7