Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
c9d80d3c2c326fb1effc0679e7487c88.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9d80d3c2c326fb1effc0679e7487c88.html
Resource
win10v2004-20240226-en
General
-
Target
c9d80d3c2c326fb1effc0679e7487c88.html
-
Size
3.5MB
-
MD5
c9d80d3c2c326fb1effc0679e7487c88
-
SHA1
297d054daac8c17da312c2d0de2917315d735f2d
-
SHA256
70ff512311fcc8efa3e643fe0df78f46d27c72f5699c2ea697f106080455c437
-
SHA512
f02650d4a2cf332aac4b2d2a1c62230fc3ab49cfc0a07b7d3f0687c7b4d8790053eaccfcb0a4d143b68f1a596123baa25b0edfa391e7a676c5d324e1b6a412d5
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NGi:jvpjte4tT6Qi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 3300 msedge.exe 3300 msedge.exe 3268 identity_helper.exe 3268 identity_helper.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe 3300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 936 3300 msedge.exe 87 PID 3300 wrote to memory of 936 3300 msedge.exe 87 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 4448 3300 msedge.exe 88 PID 3300 wrote to memory of 1340 3300 msedge.exe 89 PID 3300 wrote to memory of 1340 3300 msedge.exe 89 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90 PID 3300 wrote to memory of 2268 3300 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c9d80d3c2c326fb1effc0679e7487c88.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad5df46f8,0x7ffad5df4708,0x7ffad5df47182⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9826159397933579754,4900088187913560099,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
981B
MD5e501a84d9cec24e6f16da6373caaceee
SHA1d3d28ad5ed93dd7f2d5467f7e3bd29be08a7720f
SHA256c0eceed23e3433fadb4789174e40b4ba8ad830dfff5a1bca600d1b20666e8e0e
SHA512360347407ca9d5f331f3495d3df26649b07dd7f0e5f53b72c5c2d5b5865827a6e647e4d116ecc3b83abab4bcc496d0802eaeee86561fca6ac944d5c93dcf7516
-
Filesize
6KB
MD5b4ed0070f0076b8dc8f7611b99063416
SHA18c968a8ca88eb87675834981d5f2b79eb7f1d9ec
SHA2564c12835525f15190a3bebf4980f70d9251c4fce8c6ccb2117a465f3d792acec0
SHA512085fd867a875aa552485c06560436ced6dab0141f25e89147233d8b51320f5c483007fa14f92d194e9b0e273eba7a8d20dd203fe734281c321ef12766822def6
-
Filesize
6KB
MD51336332107059926a828f661438b5396
SHA19f6e007d71fec901003bd33543539b8f92daad8a
SHA25680fd17d09b9f05790d326b1976f59c5838489c06279ab0e2f25691eb4d7e0f40
SHA5125e7214c7dcf8041ef167da83bd6626708b6eb86f3728c79178900c14d0927d7634a04eeb581f966bfece1ff4a802ad8618e99c59077afb1701fa61e6a9a7f804
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50aadcc9d22fb6cdef3f3085826a7a616
SHA1e05a2c9f0918560c6aea56de0841371a72e67934
SHA256d303df2ad992d37b25b4563fac12d326df5a8cbb3cc71c9b8269a8506775ab59
SHA5123937df4c4c7508be7b59b11bee6891001b07d983dd567075724adb1f3336483d8ba186a11bd39d357f6f2aff336f3cad05a8261446c5b0a28c11ec7148520132