Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
c6291804b34d36de88b56d84c681655f.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6291804b34d36de88b56d84c681655f.html
Resource
win10v2004-20240226-en
General
-
Target
c6291804b34d36de88b56d84c681655f.html
-
Size
3.5MB
-
MD5
c6291804b34d36de88b56d84c681655f
-
SHA1
8c263e8509c7fb4e299b791d56bbdfb03fc715ae
-
SHA256
4287be1534d3f8fa047ceeab3e4bbefe19adf9fe33e0857d57b04d87585827d0
-
SHA512
8858a3bc5b0902a4a16a360e727ef87ff80a6e45cd59c8afe84c59e1fc07835d014927cf6319ee8d59560250f7cbc09869730587179c2a8d36183959aeac9f82
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NNW:jvpjte4tT6DW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 2180 msedge.exe 2180 msedge.exe 4880 identity_helper.exe 4880 identity_helper.exe 5280 msedge.exe 5280 msedge.exe 5280 msedge.exe 5280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2468 2180 msedge.exe 87 PID 2180 wrote to memory of 2468 2180 msedge.exe 87 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 1192 2180 msedge.exe 88 PID 2180 wrote to memory of 3120 2180 msedge.exe 89 PID 2180 wrote to memory of 3120 2180 msedge.exe 89 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90 PID 2180 wrote to memory of 3764 2180 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c6291804b34d36de88b56d84c681655f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd292b46f8,0x7ffd292b4708,0x7ffd292b47182⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13153226407188272364,9687791659358945803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4352 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
981B
MD5153c551255b845f0d340fc7363964870
SHA147431f7be7354c5b535bfc7ada842fe53bbcd71b
SHA256a73402c2db66b34123f2a63d12309689a7efb240fdeb19a469a6fd76808ca78b
SHA5125df5529350889280140ce2ce58e17e35735b8263610b7f2fc00f2b5493cfcb2746b722417baa368aa6cadcc6ffaf1ca36e32daac048277356088df51c4b0d41b
-
Filesize
5KB
MD5b87f8741f635c2f0c30b2a26030bf963
SHA134d9e9b1e2b08fb4896dd71d4da133df67507fd5
SHA25698c6c1c82bc63c2311c2e6450a51726a7b22bcdc0eab139263ba26edca2e24f9
SHA5123f8a6717048a690cde118fe4aa073561170808cee546771a2c941970af5745f303f12b4be4ef1a34e5cba95ae424e70d14435dc01a74b8666ffccec738cb9e9e
-
Filesize
6KB
MD571736f827e9d2809030d70a79c5b9a4d
SHA1dadbb941db56fc1da0f5d1b00d8613f1b47e1ffd
SHA2566e48517cdba38b7f9b1ae4da4c8b51cf3e76dddc45b8581ade9b13da586221fd
SHA5122abc5e7de0e8978a64bf24d70c401f8076e381105f5fa8eb9aaa8a44b966f2d6249970f2704741ff29a0980fe1a0c7d0ef7776ab583ca6b4721f70ae16a26bd3
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD58e4d0e4aa3afa1d07cf151de36803ac2
SHA185ad7f7e30018bccdd1a1fa86502f9ea0b386511
SHA256fd9541eb85cd6fbabd20777fa60e98851650afb8f4bbc5f1b27cd84f9ccfc4bc
SHA512f5ee9ced1b7a25c5f56e9b95a0a0debf70cafe0de9a617f40de804973a522b1af33d4a8707360f0a44934546094d701a5994ad0771ae4f290bee1c3d3a9ebc8d