Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
c69ec7216837087faa1769c4a0ab4965.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c69ec7216837087faa1769c4a0ab4965.html
Resource
win10v2004-20240226-en
General
-
Target
c69ec7216837087faa1769c4a0ab4965.html
-
Size
11KB
-
MD5
c69ec7216837087faa1769c4a0ab4965
-
SHA1
69cce820bf611dcf3e2f8d4869952c8876ad7fca
-
SHA256
e97c0b7417e0c99da764a2c297b32e7dce60611a5d3c0291066719344f779c9b
-
SHA512
25083a25ca4626bab521d8975f5c282e38f26072adfc94b3073ad5d2b689cab38de5b6ff91b3637541a93589961e579f7c8fb90190f6f25a059f7dc388cbe012
-
SSDEEP
192:2ValIsr0r57M4Wxa/T8I+/w1wvqLkt1/6uBuLbdU8d:salIcIQ4WxaX+/gq/6guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 3888 msedge.exe 3888 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 208 3888 msedge.exe 86 PID 3888 wrote to memory of 208 3888 msedge.exe 86 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 4240 3888 msedge.exe 91 PID 3888 wrote to memory of 2508 3888 msedge.exe 92 PID 3888 wrote to memory of 2508 3888 msedge.exe 92 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93 PID 3888 wrote to memory of 3956 3888 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c69ec7216837087faa1769c4a0ab4965.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4fa346f8,0x7ffb4fa34708,0x7ffb4fa347182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2050100213784334268,2652728100672551426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,2050100213784334268,2652728100672551426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,2050100213784334268,2652728100672551426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2050100213784334268,2652728100672551426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2050100213784334268,2652728100672551426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2050100213784334268,2652728100672551426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2050100213784334268,2652728100672551426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD52b29e6358899ec3b516386c8e50a0772
SHA14f35aa6f87d67d4438af8225f8cc79eaec5654ea
SHA25658079966c22eedd41f412d29964bcc22a63bc72ddd4c4951b42dc4cbd5cf3ca9
SHA512f3fa9172ff8b46ff7c6ce47202b5647761f326ef33abc306170da288b93f5f797fb35b72bf8a4ab32b84eab13735a7128a73ad059e7c270ef514010d13358dd3
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD586ff3b63e3a3626a0c95d3de72bb94b5
SHA1dd6688a48eca871aa84b36d25f8310967d604f3b
SHA25613cfef9a2b65f43bb4d4865e00f7436bab04f6362b1554349af7339240c33c5a
SHA512e7f627c075e93c73d28cce90e7f24181e41f2fa2bb942ea86faec277d054b1714a840dd7baff54d30177351911d9bf96c35e1239cb3af84b5c1b32df0ab390fa
-
Filesize
6KB
MD56cef9a4d4bcd34c6b404bc50cea6a1c6
SHA19ac693053b0124b4fa22612e66a0c205bef66045
SHA256ebe9234e6391d2e79ddbccbce4554728b3e538dd9873df1033c3df1f4cec97c1
SHA512ab41923cc752a1db4d06fc5a8b7b59a4116dea43a0a660723fc038796647de275c970daf770d15a80332739749b8fcf04bd819e1e1a462989efd715e6e89e6de
-
Filesize
12KB
MD595ec5e582910e5d8a60f09df37fbc661
SHA18fba02c73832d66b96c50460c4217085d68dbaaa
SHA256a45ead951f4905134071be4085b78068429c2ebba9f4c8c6ace4f3574f9ba309
SHA51225f05cf429e93b2773470aa0bad083a2baed23a86f7e8800cf961fcf689bdecd46243e9ba54f0d1222791b561e0d40dee7b05262333bf8b6d9fcf483645533d7