Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
c9991035fb805067956ee8d1f28d7044.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9991035fb805067956ee8d1f28d7044.html
Resource
win10v2004-20231215-en
General
-
Target
c9991035fb805067956ee8d1f28d7044.html
-
Size
21KB
-
MD5
c9991035fb805067956ee8d1f28d7044
-
SHA1
160c0b06dc4ecf6bce231df524ac8120b201d91a
-
SHA256
8e45e5295a6ff4065f686b3e70722cb7e3f805eadff0c7b9ef015198bf92bb56
-
SHA512
d21c71d9d6ec2f7a100a69f8336fb9fae2452372b56244cef527c81547937d646327734b2faa37b09ad277288838d260d83b5af062d826f82ecb784f9cb1f49b
-
SSDEEP
384:F8an/E79thnflvP5LEfqiSiDfQ3anVc19GK7vNOSGKx4wRmnAwskkUgVLRd:F8an/E79thnflvP5LEL7DfQ0qaK74KY+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 1616 msedge.exe 1616 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 996 1616 msedge.exe 85 PID 1616 wrote to memory of 996 1616 msedge.exe 85 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4260 1616 msedge.exe 86 PID 1616 wrote to memory of 4176 1616 msedge.exe 87 PID 1616 wrote to memory of 4176 1616 msedge.exe 87 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88 PID 1616 wrote to memory of 5004 1616 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c9991035fb805067956ee8d1f28d7044.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8232446f8,0x7ff823244708,0x7ff8232447182⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14604912123103017184,9690306545052833357,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD5f3fb02b655cad93da7f6f4a5907fd235
SHA1487d37fa6ac945299a16c64b7f555df52dcd8d4b
SHA2567798c67906d8c99c9f1a79282b598dd22cfbdae24b414c5b78ae5d18395c963e
SHA5128d2fccd83c1b18d03f53ce53b10de2a75dde46c5c3ffc1b6d33172551bd8bffb8e1916d5cf3d3252c7e6bb05950c47dc8b4083a69122c197ccbb86f08cde4c72
-
Filesize
2KB
MD5cfee4aa03e2006b7c28d0ae2a641033f
SHA155dd0bcc66178de684835b09d1a40034018b572d
SHA256da19156baf30b8f4edf0987d225cbdb2df4875802d613cec772b4b551d68c32c
SHA5128ecedb45f267a0330ff2b3be11c619bb2d2ee1ff9089d3781cfa0b6471b3763371f6dd660550a861822b04295ced2c824fe970ac079fb59380d462cf0f74c341
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD54878c7cd39033a7ec2b2be44823a405e
SHA1e6d16d3d89cfaead5ee4580c56f880beb3c41e3d
SHA2566f01ac04828bf5038cb33aaff88daf39204a6faac246f6916d3a42a691f05917
SHA512196a85637307844ff799f9a15b4a7ab21f63ec9a5ac7125ee89bfd53f2643474e3e145712c5f916c835dba2472b94c296510be20075c2879501278701eb0a994
-
Filesize
5KB
MD5ecb722c6e1dc58da52059565c2465b08
SHA1fa4afa35d303a1777a19ccfe126789773325e34f
SHA25682dddf80d88c26f31515ac20baf1008b931e8848fd592a87d56d4981b8501117
SHA5124263eccdba1a3ee4a1c72f0e03a847170a6d6b152434aee6ac85ef8f6bcbf12010e0e200ec5d6c9a0a91526d6ad3eea0dc407a3b18c1e1984c9589a0b621b925
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
10KB
MD5ad74e591d48e75bfdd45028093c53b75
SHA142701be9c94d2ba8e5476996d446141cc93a5110
SHA2567752ad2eb02636da11c29cf1dcd912f336e0c5d0539b8982739126bf5c5026a0
SHA512e6210828fc2495e6b13f23081515da4c5635e1760439de1fe51e7d13e0dcfc4c4e4ab1d70e8ac72367250aec2f19816a4f87073827000f2427f3d17e10d7c6dd