Analysis
-
max time kernel
1680s -
max time network
1684s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240226-en
General
-
Target
sample.html
-
Size
53KB
-
MD5
4bc19372cf3679f2c408b8331b971074
-
SHA1
d65ceea04889bdcbaa441e64186930124ffa82a5
-
SHA256
fc89aa48aaba890e48cd0c4f17a668dc35960e442f657bc86f3a0bb245b2e93e
-
SHA512
7ea1801e21c9027b4ee2d0d0ba12557d9c036e01edf647e35c00cdc05bf330a608184dcb2250ec7f97f229f2229ca5ff12bcbb0e7fff73c70499a5f485998b4e
-
SSDEEP
768:x1qNCsw7+rM7oOxKDgHYnow1Qlg2B+3XasYqytcaaUw+7WaNG8mEyn5DIyOYMYRn:5sgyokex+3XaHtcoryn5DIyT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 4852 msedge.exe 4852 msedge.exe 1504 identity_helper.exe 1504 identity_helper.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe 1732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4900 4852 msedge.exe 89 PID 4852 wrote to memory of 4900 4852 msedge.exe 89 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4204 4852 msedge.exe 90 PID 4852 wrote to memory of 4564 4852 msedge.exe 91 PID 4852 wrote to memory of 4564 4852 msedge.exe 91 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92 PID 4852 wrote to memory of 3852 4852 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdf3346f8,0x7ffcdf334708,0x7ffcdf3347182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,8926457095166266041,4356147749244218115,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
6KB
MD5770af8e9113ae5ee0bc4e45bad170c50
SHA150b9e77cca8716b5cf9f98f1143267ead49af594
SHA25639f560e3b055298fb86c4096874fb1cff81c3e77619096f5b68b18c3f6380901
SHA5124eea3aed55c50d849da33d15533d4523ba465769e0503be0252cb659c0c6ae02442e2aa6b869e6757ee97607410a8655547ca4ae17ef42eca0ab0b4877dd890d
-
Filesize
6KB
MD546b05dae87d654ad7ef6621f446d248c
SHA1fff3eb6469cf9fcc3af9bbe27958f89fe9f8968b
SHA256df5415a909c9d38192cf39df0bac9111807747dc6c8397ab9fcf8ad686cdfa81
SHA51235bb65e5a78efa37428bcda6c97f418a4d33632421276961487935341cde26883f7d842d5e530a58029ccd1ef48671dc95c9e8ee137b528a961869a96010caed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5d192eb56868d0e6c281257d66424e4df
SHA1f8af87cc6a6a7afa5580391d03f3289d6c34082d
SHA2561def5ee7225ea2e56f384e017e6693d1d5d05d63369ec4bd90875b5c5780d98a
SHA5129e2229c8c9848d8a03e9a30bfe8c771361435e49176ff89724c9c5ade92d98604aaedb04edc2ba748744f665df9e4ed17990e6b8c2f34d2fb8bff406afaf98e2