Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
ca36b694155c48b77bedd84eeb717ccf.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca36b694155c48b77bedd84eeb717ccf.html
Resource
win10v2004-20240226-en
General
-
Target
ca36b694155c48b77bedd84eeb717ccf.html
-
Size
3.5MB
-
MD5
ca36b694155c48b77bedd84eeb717ccf
-
SHA1
7db105d69f1adeb11a735436c188b67ea031c77e
-
SHA256
1b57246eacd461e969e7e08ff4fbba2a2c084b54f3daa16ddb4b78ffe25cde48
-
SHA512
661178816ea3a8700b4b4801621f176df1af30cfe61d73daef4d6f098e0f3595a76345caff4cb05cb062c483e0f5d345e30b8e6e8a21fa4f849f27fb4af52e8d
-
SSDEEP
12288:oLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NEv:ovpjte4tT6Kv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 1452 msedge.exe 1452 msedge.exe 4936 identity_helper.exe 4936 identity_helper.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 32 1452 msedge.exe 88 PID 1452 wrote to memory of 32 1452 msedge.exe 88 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 1832 1452 msedge.exe 89 PID 1452 wrote to memory of 4572 1452 msedge.exe 90 PID 1452 wrote to memory of 4572 1452 msedge.exe 90 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91 PID 1452 wrote to memory of 1404 1452 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ca36b694155c48b77bedd84eeb717ccf.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4fa346f8,0x7ffb4fa34708,0x7ffb4fa347182⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,2870389612423196495,6064933362004796507,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2420 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
981B
MD5212e96c238b55015b3bbf9393330cc4e
SHA10b4a7dfd5e0186b06736aae75bbaafa6098aabaa
SHA2561dd7e62cf385b53a2bf0e517f26f1b2c9cc08c7eb298270d69c9476295280d09
SHA512e15699ef5b8cfeaa37ae4dbd43ab698e8fc8c8c60360dee1d64ec405c4b264c7f7368739658d9c360334839e8832faf232a6bf47f116ef5ae29f91f0203befb4
-
Filesize
6KB
MD5e39269ffe87103fccb26fda9f3cc7863
SHA1305923d96450c99d426e8e7a40a751a71604cc0e
SHA256faa16d16a7231c9e8400a5e9c0f47ba5b01c820446e06f1615d4993f35906e2f
SHA512ac9d8a72a42494c95c384fa6a7f06fea077c0b5f212f011dd47fe64ab9df99dd78e1fff0a0d30b265d45591aae8be4c7044622ba6f55172f89268f56a590e888
-
Filesize
6KB
MD5c88ff2572bcb238d280cb3a65284e34e
SHA1fb4ae125d916dc61945da5cc170503e68f42461c
SHA256a76251f5b8d42e84e03663c679c39477ae08abad049766fdaba3d4f7d7f1f572
SHA512675086d6c909dcf164d05dc3883ef26ff37c4533e1a0881e6bacc889f47c2fec63b419002e6f0a062e70a2d4a30689f42b361c57965fec5e8c46dd330273680e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD54aaa01cf42c907827f2c0e5abde6b7a7
SHA179bbcf06540da47cf3a0f7afa38ed34a608e9fa3
SHA256bd8331634b93d41ff29bb7c078aa12e8dee558fc8be6394119a93ac7258da066
SHA512f245acb37f943b3b57985e00b88c6ea0a37ebc01e13c6296264347ed99e236f612fc765b1cf02354c949dc2f4c0baa23b0a8c09b74966ea58f6bb8deea598456