Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
c8223bbb4222f044aa29c8ba207a4008.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8223bbb4222f044aa29c8ba207a4008.html
Resource
win10v2004-20240226-en
General
-
Target
c8223bbb4222f044aa29c8ba207a4008.html
-
Size
3.5MB
-
MD5
c8223bbb4222f044aa29c8ba207a4008
-
SHA1
85b9e0303b06e97673ccad5539d3dac81e09872a
-
SHA256
6e622efd6db194778dca39d25d487be9e31c779151d5661ff0d47e1da3d0ecc7
-
SHA512
49914f1f33a54a5327a31882da6074523f6fd86a86830c34d7b8719c7e2ec10badd9bc309ebdd555471747d6db3c6bdacddb0461cb548ea944ee3333e491b695
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NqS:jvpjte4tT6wS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 4296 msedge.exe 4296 msedge.exe 5056 identity_helper.exe 5056 identity_helper.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 1844 4296 msedge.exe 92 PID 4296 wrote to memory of 1844 4296 msedge.exe 92 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1112 4296 msedge.exe 93 PID 4296 wrote to memory of 1772 4296 msedge.exe 94 PID 4296 wrote to memory of 1772 4296 msedge.exe 94 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95 PID 4296 wrote to memory of 4076 4296 msedge.exe 95
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8223bbb4222f044aa29c8ba207a4008.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabf9146f8,0x7ffabf914708,0x7ffabf9147182⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14029864136463991632,3683910484904088372,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2524 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
894B
MD53c5c1023a5f68570139087af4ddb233d
SHA187b09debd874a985a6632ecd7e7ef4e4ef728546
SHA256e305c7f13a531d304330179c9c59327025ce707082640b55f5df7247c31baec2
SHA5120d764ea37310592d9b10f404f494229684a872121806d0997297e163de9d0aba8ac3c37dac69ad35446f58f7e285198f6dc5b39cfcfbf870869390aabec6b860
-
Filesize
6KB
MD56bbb972cde6e78c3e3900be7c208f2b0
SHA18e8ce65ccf2ce3fb334545c0a65fac4af36383da
SHA2563fee733c8d1277bf9d5de1f3c555338bc466eb8e637bc884edc17c4126659733
SHA512b171955e56b5f66f8a1e51619849e0be944c3cbbc08f9f3d53911e0f462b32b2221f11726dca122a7c46ad28d3392ce8cd25bdb73be546c917a7f3294b04a0e3
-
Filesize
6KB
MD50250a6c8a8b906a66edd947fbc5886d1
SHA1ed733b5916c360762d6dab3478425ffaa0b202ea
SHA2565a8a4f9cf33aef2cc2aabcbe0c4e76648eaa8bbb7d878b7a0bcac1efbcb48a8d
SHA512e201ed6a3e1075103b7c79c373ecb5233971a411ddc7adaa60068365384a35ddf0277a715d647af837403826ba2b13630bd4bd94f845d0ce87768ac1e412e5dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52f5336b71758ecd428e638c098ef7f9d
SHA1afd902d38aaa6fc57b727e8522721d02473b4427
SHA25657f6500dec466f9ecf3778f12c60f4381e33693b3f155863309065e91c674698
SHA5125f1d14a79c1b860616bde6d163533e1f5fbf96a8b78a157c522ab35ef8c806a8b1b3fed6ae64f5b8d98caa8acfae8a475ecf3567554606851cc559b2c114c186