Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
c7e0ed8f3f6e8ded10db00a25838f2fe.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7e0ed8f3f6e8ded10db00a25838f2fe.html
Resource
win10v2004-20240226-en
General
-
Target
c7e0ed8f3f6e8ded10db00a25838f2fe.html
-
Size
14KB
-
MD5
c7e0ed8f3f6e8ded10db00a25838f2fe
-
SHA1
cf3744779c753ccd49c3f9f66bc9e058dce5afa8
-
SHA256
ccd9b1f755d93a4c84538a0195c5a2807800843f48bee338ca66c6eb76104ca0
-
SHA512
cde1bd9c227fcca24d770e886981a4eecf156891010641af5a296ed40925062fd449a991fceb1eef1bd36a8b9798111ce6a2821622fb6a2bd0079ae2e430de08
-
SSDEEP
192:+yEioELD/ZmXg8oWllefMJkZQ3wf1vhmlKt6DvE:aioWD/ZmXg8SZQOmlXrE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 4084 msedge.exe 4084 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4360 4084 msedge.exe 86 PID 4084 wrote to memory of 4360 4084 msedge.exe 86 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2516 4084 msedge.exe 91 PID 4084 wrote to memory of 2992 4084 msedge.exe 92 PID 4084 wrote to memory of 2992 4084 msedge.exe 92 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93 PID 4084 wrote to memory of 1068 4084 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c7e0ed8f3f6e8ded10db00a25838f2fe.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff814c546f8,0x7ff814c54708,0x7ff814c547182⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12762187923913382889,2664035635162128044,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD5b20023ba62c17b4a0bbf4f7c48982019
SHA15a835adaf3942234bcf079ba108e67ca555c69d8
SHA256e682bd85e6300e0a51fc170c9d38a58a5b999da63c64adfe1534d091b374390c
SHA5125fed9ab581db09e0f08a927294ccfa0e625df697bf867b1d8df08a96d50f5fff1bd9beafe27e5c328165a7a9f0ddd1f8824478be31cebe2a4471dd77b071ee49
-
Filesize
6KB
MD594bd7aa42dd3ce954e6d756417a4a439
SHA13cc898c1994acc0b69a64359f330c44efa644727
SHA2564668e46a03a38034357f43716054d00dd863644444f350b96bfb02f1a4341bba
SHA5120af57992ea5e463edf6a18e7d647baba3a50617ca1061dcf8fc1b0e3fee163a486ff6437be41903f86e7b9b426f42dc78a3db7d22403d38bdd7cdf02fc0ff33c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD597afd3cecc7c438589924642f940784b
SHA1f57e3ce0b2f598bda8823c1260d386bddb753dec
SHA25618b7c9260ba69a0504cd26f4f596d94d69163fadf2cb8e114a579addda69339e
SHA51251c65db3629e5fc77c445659a78a0b09df3a3ffb1ba1a123738abfe89d7c58179e146bdce0ab53b1b09ff2b517adad5232abdd5bd1c92dfea9255d854f24210d