Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 20:47
Static task
static1
Behavioral task
behavioral1
Sample
c6d22fd90cc7ab2038b79760d8771e09.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c6d22fd90cc7ab2038b79760d8771e09.html
Resource
win10v2004-20240226-en
General
-
Target
c6d22fd90cc7ab2038b79760d8771e09.html
-
Size
1KB
-
MD5
c6d22fd90cc7ab2038b79760d8771e09
-
SHA1
01200c3bf4b5775cf7a04b023b20a72b0970efbb
-
SHA256
1a91605b6eb0892dcacbbde0af468297e6f8610bf861f94d3d3aa32000d8b299
-
SHA512
c8b1e81ffae88e47ea0bbbfe7c5c2a5ed588a24fd28aef446293c4fe915f4a4709c44edeb4729bba8af7d6a89b0bf7e54a14204f25db10b76e00be4efa7bacb7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 4036 msedge.exe 4036 msedge.exe 708 identity_helper.exe 708 identity_helper.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 1304 4036 msedge.exe 88 PID 4036 wrote to memory of 1304 4036 msedge.exe 88 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 4644 4036 msedge.exe 89 PID 4036 wrote to memory of 1128 4036 msedge.exe 90 PID 4036 wrote to memory of 1128 4036 msedge.exe 90 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91 PID 4036 wrote to memory of 2636 4036 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c6d22fd90cc7ab2038b79760d8771e09.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4c3146f8,0x7fff4c314708,0x7fff4c3147182⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2208 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2576 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4761617357906732853,14290066240001917503,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
189B
MD54e5358a2c6de92431acb4798a23ef492
SHA1889ed02171f7e1c06d062073d67c9b8267e12f3c
SHA256b65331a600b2b21865b77cdff50bfc8550ef87008413ef3d99a9a1084b5ce38c
SHA51230485b8f158127294fd53afed26a245aef98c49e2efdcc1a32fbce60d250fe4a78822005a18bafbced0b9dec34e7ef3c82a0b28baf0f8a1523337827984a95e8
-
Filesize
6KB
MD5b0c0c8632853c49be60a2ddd44418663
SHA15992e6e134a7bbdf6c290b8eb35c83889455e21b
SHA2561e0c4b5575e89eb3f645c273d7d469b9d388596a1026fcae24c577404901a225
SHA512d8799cd690a35af3ca80cb24f43405cc05f065d636d05923828f5149f1cebe59ed232cf53d5eb9897bc8e7c30e80d08db6c3c222cbd09e4ad1eb5e40be6a955e
-
Filesize
6KB
MD54545345218e80c56b321aa9746486c50
SHA189d46f939aa65ebd8c05df0914c34df106a35e34
SHA2568f307aa424d9bd370179314d62aff54440739f1ae3b9a79fa9763648333e18e4
SHA5129b970bb50d4634d1a6714b6bffe1d9f892184192d8786484ea97b3482ddc308204a5a11234e9f1f64994dbd258a5f6d657b15b4c8ffd020e80db3b7b21b38d88
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51cb95d534e9cec401f737715f6d50c3e
SHA1a5728f7ad8d3b5af71a1c3a9b389793f569c6d20
SHA2564a0f02a32b15d93e2bd0d49895435e9b153c5aef8f8060ef36ae2f84533e5612
SHA512f8dd29471358e2b72f6e65ec40c00abcd8fc2b269db81c5efe87645b0b5024c6ed36d07f3f99fb57a37315352610b60793b73fc5bc3fe18755f41c612964dce9