Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
c75beb5f6519788e81c6c96b7f1933ad.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c75beb5f6519788e81c6c96b7f1933ad.html
Resource
win10v2004-20240226-en
General
-
Target
c75beb5f6519788e81c6c96b7f1933ad.html
-
Size
303KB
-
MD5
c75beb5f6519788e81c6c96b7f1933ad
-
SHA1
9359bd6020f1ee647b70d50197e20633efeff3b3
-
SHA256
201a2c50d181f9e1b9ffe26c2d8f93971524d2f15002f85b8cbdb9ff18b6bdb9
-
SHA512
2c419c45b3d968e78b0c9f0f925c4e0e9d48bee33e869e149751c1c7e3b899763d73de30a36665620062638821c17a602acb4666c355f37786ec1e12bf17c3aa
-
SSDEEP
3072:pV5/RrC++WVN34RZSiPB19OqAno9eOlpR9IGNBcbUgeCcjvdPd7ygzdLpemELai:pT1loBchOddsb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 632 msedge.exe 632 msedge.exe 3572 msedge.exe 3572 msedge.exe 452 identity_helper.exe 452 identity_helper.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 2840 3572 msedge.exe 88 PID 3572 wrote to memory of 2840 3572 msedge.exe 88 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 2592 3572 msedge.exe 89 PID 3572 wrote to memory of 632 3572 msedge.exe 90 PID 3572 wrote to memory of 632 3572 msedge.exe 90 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91 PID 3572 wrote to memory of 5108 3572 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c75beb5f6519788e81c6c96b7f1933ad.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd345946f8,0x7ffd34594708,0x7ffd345947182⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15538361190405379771,6289003557800252445,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\02eead29-c2f7-49af-960a-e05c1e91ccfe.tmp
Filesize187B
MD5679d18924a079c2277425ed02b624592
SHA1ccfd1589ef81ac216ad6e16a7aeb95456b2081fd
SHA2568c9f0f18dea3d3dd87eb64d5f15b56b15616b4c34b7aae6d4fb8e2992467b5db
SHA512a2b6f3eb6b4b2d3234560dfcddc67527697233bfd3768daedca6521fa722ea0f5c145346b30d656e559370eb4a8bf36c3bf4a1647c15edfbcef1a80e64ba1b68
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD550f53837c6374380dee1f7d102f05e2e
SHA10a990b8b3264ff5403385ce7434cf3dc903b42fa
SHA2562d9da9b19d28323b8c25df4bf9479490c1f0efca0f1e533d664dd48ac7743450
SHA5128b07488bcbfe1fe199e578d6ca067a962ffdf400009534081754a683b7a08858148c3a699a548e165b91da7422ea17076ab5b77aacd5385f09b9e10b3d2e6e99
-
Filesize
6KB
MD5b2388ab30938b15f49a0a48382bc0b92
SHA1874fa2d0102d5f52cdceb509b3d9280f0cfaa013
SHA2564aafdd2f9b1aa5db26b7128c77ee3d783f00b381615bf3b61d587de31df1db74
SHA5126101f7f922ce41ac3ce1209878301915ac018f635f600947ff462cd7c6d2b6db0f88b1c0b98a72ade3511e72d483c5527372570fb8e4904b3b2a98b96efea0e4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD595c77fc6cccdb7240e86c357a6d4e43a
SHA1c3d4ad86bf2f2c8e7fc344de3f025dfa0d11e63d
SHA256c853653462b0fb64eb1c75471810d5fa60817497ad52427fd32f895ab83b7316
SHA512fe294c92ed63cd17f9601b258fc79e087f0bbb4ab2cadf8a0ae082ec92cbaadf0167eb4bcd34b9a13717f5c79f8e5543527401d30afa7bebdadd8e82546014ce