Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
c568bf01a0de5f325df05d66b9567fdc.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c568bf01a0de5f325df05d66b9567fdc.html
Resource
win10v2004-20240226-en
General
-
Target
c568bf01a0de5f325df05d66b9567fdc.html
-
Size
314KB
-
MD5
c568bf01a0de5f325df05d66b9567fdc
-
SHA1
db858dd22002252f37cc9b95ab74781a357fd4c9
-
SHA256
dcc1899e0ffdc56cebed5bb5329f3db9085f60b9d75d962b3d78568e45d55215
-
SHA512
7f311bd776502294efec762d272e46d83b78c59c7f01747355e481e2c19e219e2a3f29ad45366d5f263ef90d6eaceed73037d5dcd0cf981ad7a83102339004a5
-
SSDEEP
3072:JJWwys5uBZg+WJhIczPdYA78jrz9SdSVkw5OTgGT8eF4dZQ/i/Hc+TIPQeXEJFf1:Gwy3QJhNJSWw2JT8QuZQKE+TI4eXE/h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 1892 msedge.exe 1892 msedge.exe 2692 identity_helper.exe 2692 identity_helper.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1892 wrote to memory of 4392 1892 msedge.exe 90 PID 1892 wrote to memory of 4392 1892 msedge.exe 90 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4240 1892 msedge.exe 91 PID 1892 wrote to memory of 4880 1892 msedge.exe 92 PID 1892 wrote to memory of 4880 1892 msedge.exe 92 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93 PID 1892 wrote to memory of 4860 1892 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c568bf01a0de5f325df05d66b9567fdc.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff983cb46f8,0x7ff983cb4708,0x7ff983cb47182⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,11484997876968186004,8552792109960150794,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
960B
MD54785a78961200e6f173bbbdcce3e033b
SHA1c9470b77e9c3498853cf13208494a583cee8735e
SHA25632b0b7f361fdac26a0d5e2e3dc5fa2c495a80c913d0d6d6303aa9f737f14a96d
SHA512ed384189311e7b652b27b2d756049396f94cc282411a831133d3e0c4db366a3ada2da89e740d34e52e2924a43fdf9ffc5d1b7068466c0568822838c404a2001f
-
Filesize
6KB
MD5ce201f4d6635a75251175b8affc24866
SHA150b0fd52c60d2b2a41dfde3fea391239830a5545
SHA2569185bee3b27283885773b6489dcfdaf8a2764ab9e568b78ee56f077207a01273
SHA512017fc86b56703d477597fbe6e47294bec6d7c0868a623177d87971f7ba1684bb0b83fd3a872eacc4ea880d8d6aa19a0e9498f8867886dd428967a1e04d43b42b
-
Filesize
6KB
MD5553a5d78601a99854330b2ec7934357c
SHA1de726247b51e2fd84adb5e4282eca9eecb6140bd
SHA256fbaa7f605b332029cc45fecb3e04328eb2bc90ec8233438ae45212563be0ed77
SHA512b26a5a93179e69ce988b63b0dba93981d9b8f55d1ed66e7ef5de4170c3a1c598707b33e2a2c47488befd3e207379a02a4c06249f14c39ce025213d436995e0e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5785871a5c5c5ba5374c71a0c0a6ad7d7
SHA15bfcc2b0dbcf1842c5b033fde18f1a057f511c1c
SHA2562ce2087a9767bc58c0ac3dee16d8438f311771d61c564c26ceb1d96405720672
SHA512ea324c03a1019bd0d5bf7db7f9f314b141271f7ab2e57a7e0bb19d0ed3314d9d5c7e9479701f06f322d58abdbc7da1be1e39b473631bfc3730124515e53fbd41