Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
c919f7c795dd104263f925c522e137c1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c919f7c795dd104263f925c522e137c1.html
Resource
win10v2004-20240226-en
General
-
Target
c919f7c795dd104263f925c522e137c1.html
-
Size
17KB
-
MD5
c919f7c795dd104263f925c522e137c1
-
SHA1
190637e4bdadd53ddcdfc4be9e5c58d81af89e06
-
SHA256
e55f3f35b7a19ac67e94b8aa5ce8751b0d0f460cff7586f0c046eefa54e498be
-
SHA512
774b912d0ca76c5110606025e4c60f8e0638c507839e0ad00c150caa6aefcb49d8410d3ec18b6b1c4b6b39160a626509cd00c3a9303b08b684a92382d0e2b846
-
SSDEEP
384:38ZlvcAySeOGQ1NMMXYowne5tcWB8BT3l/NQ2V:OcAhGEFxM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 232 msedge.exe 232 msedge.exe 3220 msedge.exe 3220 msedge.exe 3608 identity_helper.exe 3608 identity_helper.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 1524 3220 msedge.exe 89 PID 3220 wrote to memory of 1524 3220 msedge.exe 89 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 4724 3220 msedge.exe 90 PID 3220 wrote to memory of 232 3220 msedge.exe 91 PID 3220 wrote to memory of 232 3220 msedge.exe 91 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92 PID 3220 wrote to memory of 1680 3220 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c919f7c795dd104263f925c522e137c1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff897b846f8,0x7ff897b84708,0x7ff897b847182⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2460 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,18072717443443583168,5860375575581305420,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5680d71db72b13cdcd97ebbe3c8a8156f
SHA16b5f20f9eded5df4640f8e3aa8adc91073da3844
SHA2567b64856d3dbaffa4effcaef307a78ceb1c3a52e430817334dc16b7ec5fbb020b
SHA512f5d3a5342cf734be3caea1773a14b4f69eaee4bf4b6c75441d64d4157f026ba5dd6ff89e5d7986a13c628d6feeaf0ac7b99dffefbe6649a697e0f8ac1f9da066
-
Filesize
1KB
MD5b1b9bcc17f2875e723a63fef080e38f5
SHA155b6b70ed8b91b2573190b148fb6e8bda1275fb9
SHA2561a31544c1e7cdace707ac7ab6dcd24c961a949696eb1793ecf793f99eaf56423
SHA512e9d71fcae831634ec19d5dc9765eeae0cf678fb77b5e8122a5cd4133b7a39cfad838a0e8669d293d4f43e0290857eff40f5aace414b1b7a7cad794bc833570b5
-
Filesize
6KB
MD59d06829ca36c8a6160fe800c2594619b
SHA119bb80ea49ceabaebd2ca9cbb803cf23416867e5
SHA256f78f925880510ee85934def95794fd6e10d214df3353305523cb96314f796b3a
SHA512faa5001747cd490e8a40e0ef71bfd4628382c90735c8d65dcf5def77e9fc85fa742ead2e2278e3044645e5aa0b9118f0397547f5da53a1d032d7710d57186bcd
-
Filesize
6KB
MD51957f2bd418ad475c0a271339b76f7eb
SHA15b1b85488e6a468fd3b15685e6656799162054df
SHA25678dfb993b6be583fa4506c0f9319a109b227e2b56629f67356b4c84a552dca32
SHA5126481c57eef09c1e99513a2123ae505b1b00ed29bb1aeda392009b20903208f2c6113f8c906b15b80861df9cd8d725468955ca414e335993d4070831047e80d9f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5506a53ff975663e35a37ef3bb0a9982d
SHA15ec7f09fbc999e20bedfdf8b917b73f981ec5961
SHA2567d71d7f0cdb6d8da4ee93959d797ba1c9c28d4dbbf083fad442c844f797f7153
SHA512773d1b60701787f113c1ae52fdcd331a36e565c24273aed0ada6a3303165d1f25130b7c19ecd3d490ded27c7928e8185fb8ad50f380e2d3fc566c8935678d076