Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
c88526e8c2c8c8e880d2d7c457d38187.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c88526e8c2c8c8e880d2d7c457d38187.html
Resource
win10v2004-20240226-en
General
-
Target
c88526e8c2c8c8e880d2d7c457d38187.html
-
Size
11KB
-
MD5
c88526e8c2c8c8e880d2d7c457d38187
-
SHA1
c5fc1831f155354939b02fbb701e4172be3dc57c
-
SHA256
dcf95046591c50d28d851489dfd63d8c763b456898c3554f8b42e9b7e4aefedd
-
SHA512
5512843dca0c0407d8365c77f1094618b63e9187e09743a3c6a1cd4f71ecf8ea21a968d783f8d6878bad8bc497590ea3da760c997bd11cc4ae1f83356251e39a
-
SSDEEP
192:2ValIsr0r57M4Wxa/T8I+/w1wvqa1JauBuLbdU8d:salIcIQ4WxaX+/ggJaguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 3096 msedge.exe 3096 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 4400 3096 msedge.exe 88 PID 3096 wrote to memory of 4400 3096 msedge.exe 88 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 1688 3096 msedge.exe 89 PID 3096 wrote to memory of 3936 3096 msedge.exe 90 PID 3096 wrote to memory of 3936 3096 msedge.exe 90 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91 PID 3096 wrote to memory of 4740 3096 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c88526e8c2c8c8e880d2d7c457d38187.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7ebd46f8,0x7ffa7ebd4708,0x7ffa7ebd47182⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13884774379012692197,9815201271650814534,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13884774379012692197,9815201271650814534,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13884774379012692197,9815201271650814534,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13884774379012692197,9815201271650814534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13884774379012692197,9815201271650814534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13884774379012692197,9815201271650814534,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13884774379012692197,9815201271650814534,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4524 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5e3894b3ebc923d4fad0f684e463c41c2
SHA154a24a9a6baabbb3d7384841f80d967e20a4255d
SHA256bedc1468be193dbd4aaf640b7ffc2af7a27eb953bd152f41637f1c8b43467680
SHA51221fa36674f12393acb1cc0b6a7d8432f425a0cc23926356c74759bd5b1c33337e913fd3a398665d99a9967678330176a03907e28275c258730c7eb7b7ba14471
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD596e8a6a0976bc5609e78160d17a53934
SHA1de6297e36ee06794845a3733ced47fbbe41e21de
SHA2565cb15f3e79dd77ff304e19cbc30c583bc5949e5f139eef5767743f6b2ebb0060
SHA51253e550eb17978f47093c37a13ca13bce886a8f24249f4c39d1db3d1e40eecdf8074bd06380bc07b7bea9373383da1e79aeac86e535c2cb9aeb87ef7bea0aa60e
-
Filesize
6KB
MD5aa9a0fe5f0068788a041a5fbd8f768a3
SHA1dbb6382fdd585f335381e5f3bd4c24d79a01da65
SHA2563af976b686eeed1786b3338655085d9229d3e95155bb08ce964f73be0a02d24d
SHA51214bb63775674d348e92943e2e54bc862f589335f091c8c90124f332f91d6d6817f40eedb51d04464d5c20d2c63938fd27e18d5600cc336a94a3bf413e55e862a
-
Filesize
11KB
MD5e2f799a9b6fb0e0834bbb318e2d2bdd9
SHA1c82f44b00b8ad0c81469bb0b2edcb4a400f0ed70
SHA2565c720efb959e6a0351c2898690d55aebdbfe3935055f395a723afd6dabf85357
SHA512953fffca2deffa9de293ffa57eb104b452df38fe2a1a6bfe2cd3ff0f4ee3b10b50c5d35052e43a6561597b93976627119e12600f2837486afdb1691e7dab5cd7