Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 15:15
Static task
static1
Behavioral task
behavioral1
Sample
c6333eaf07cefa49f98ad65a6b4f7558.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c6333eaf07cefa49f98ad65a6b4f7558.html
Resource
win10v2004-20240226-en
General
-
Target
c6333eaf07cefa49f98ad65a6b4f7558.html
-
Size
90KB
-
MD5
c6333eaf07cefa49f98ad65a6b4f7558
-
SHA1
b0081c3230a9762dc1a106ec3643ba2526822393
-
SHA256
dce91a3d6c29b79661813b4c20c579e0db9d43fda076aa279ac58a9be9438ff0
-
SHA512
be93967fb614570a2891b4cbfa9ccd446088882d776aa292814b883a6ebee6e737f56d4e727b10afbd873c814a1283770e7b220b687fe15f84a024a99a91f1f2
-
SSDEEP
1536:gQZBCCOdK0IxCv9YJf60K1KL3hP64hbxunPCHPYG5mRG9bnpEHi6lWb+JQXYN4Tn:gk2c0IxoixPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 4876 msedge.exe 4876 msedge.exe 4712 identity_helper.exe 4712 identity_helper.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 2576 4876 msedge.exe 88 PID 4876 wrote to memory of 2576 4876 msedge.exe 88 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 4664 4876 msedge.exe 89 PID 4876 wrote to memory of 3924 4876 msedge.exe 90 PID 4876 wrote to memory of 3924 4876 msedge.exe 90 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91 PID 4876 wrote to memory of 3480 4876 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c6333eaf07cefa49f98ad65a6b4f7558.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3b8946f8,0x7ffa3b894708,0x7ffa3b8947182⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,6391094911700507869,8899965728913505846,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD58fc82433308eae69c052b74d6b0f047c
SHA10ee4f9565a329b8f91e2340cd3bff207f76329fd
SHA256072b2411385bdaadc4ac507fc2a7736b1cca61c8579ace98de1995fd5e500ad7
SHA5127898b819a96b8e3e931d277c911e59973eb8a53245af91be133b8af8bf41826734c21ad789f4992ac992ba85840a80f0b2e9bf846c6129b1d1134912dd065d5e
-
Filesize
1KB
MD50165ef90e41818a42929e7f76f9161b7
SHA1df279a1df580e0290b302cf5d5234dd8b004452c
SHA256706ed6fd833c8ea54a3de5f0a553ae0802fb4f6313f54a2ef0cdb45eb937cfae
SHA512eb1342b028dbf4ffd2ae4c5be1204589dcb0fb8f65c1c837fb8e1791d5d603e87de15f20c3b071a709db3ab407e391595d6199379856f1a9ca5052760d24fb95
-
Filesize
6KB
MD5400ed1c5e0fc95c4565cbba7e16670eb
SHA16969fd0fa42f19d465240abb3f92985c5fcb000b
SHA2560d5d05580aa9f30f6151cffc28255bee2fcebe6ac684d4c6d6bba7b7ff1a77c9
SHA51228a4dd478e730d90fbf3f4e8a28676bb1da6948df8049af62eac89bd85c3a384f1b718148d91f21dcf3aff1b36ef02fc9cf0892849615ca84491e43f2047c899
-
Filesize
6KB
MD562c37681c05873d70a2ae579e48a1c74
SHA1c649f8511646a533570b47d85cc0b4048cd6df25
SHA2562537d91c0a39f1622466ca9e88e0cc200dbba590b04b1fcc61da08ce95b856bb
SHA51232289dc94f5a99b5a7f76b6f9577830337fc6c4aa97b392008c9de74bff31b66a7f8b191bce0a6409b489cd6067d3d162f7053399df0d6cd40f4bf523a87d962
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5341a938b3bb075c64784109fb4c549da
SHA135f6bf1727017d1537d5bf9de3a2d719a70cb32e
SHA256c5888486e22acd8008040bd35ce07b3e90ff85add64e9b936d41bdb519395666
SHA5122aeb03da2badee56fb88bff9665fe76e230a5f917fb40f07b13b997b32bf4907540cbdb864a72153e40b534c0915669105b88f41292a4b81d8b61f83899835c7