Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
cacf036aa64d8134118bb9666dd7d456.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cacf036aa64d8134118bb9666dd7d456.html
Resource
win10v2004-20240226-en
General
-
Target
cacf036aa64d8134118bb9666dd7d456.html
-
Size
58KB
-
MD5
cacf036aa64d8134118bb9666dd7d456
-
SHA1
5fdde28a82f7806056183bb9a4a2bee518648c3e
-
SHA256
dd3bb271b43f42baa4da1e899e2de657e77a3d20c82423cbc9e63c54f8bde1ed
-
SHA512
b6cdec539837b73a28ec553765ef94710098e957dc1d2a2ec112740e3bae61e95d9aa1c4b06acf36b71a4d91f2c07071d3f09ed037feb2fc157e49bfe372d934
-
SSDEEP
1536:YIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZBEE:bBEyQpKTnaTk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 2928 msedge.exe 2928 msedge.exe 2348 identity_helper.exe 2348 identity_helper.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe 2928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3500 2928 msedge.exe 88 PID 2928 wrote to memory of 3500 2928 msedge.exe 88 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3756 2928 msedge.exe 89 PID 2928 wrote to memory of 3252 2928 msedge.exe 90 PID 2928 wrote to memory of 3252 2928 msedge.exe 90 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91 PID 2928 wrote to memory of 3144 2928 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cacf036aa64d8134118bb9666dd7d456.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa530546f8,0x7ffa53054708,0x7ffa530547182⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,10519849458163395052,12255820378243157414,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
308B
MD58b5acb95c802287f56f7c15cbb06da52
SHA19b70c5d7a06a26f9df26e0b333e214cae6b300f4
SHA2565fcd9a417273629da9872609e14e7699491a373b1c0ef789232ecd99d0ee4964
SHA512ecf0ccebb0037f1329949396e69ac2ce2ec4978a282fd9a61f929f8b1ad13cc49bea22df44a7156afdbba9705a998632b1a4a5ad02f77dc2b2f5f18317d6542c
-
Filesize
6KB
MD571cc90f0ae6c1fbb43ba8e4102fe7c7f
SHA15bdc3da564f3c2dc1706309bc2a7deed0b8757c3
SHA25636e12816be71a8e22e9c217df9d8ea81e8a9f843651704a34e12696a6522c7be
SHA5120cdc9680a1b6a2fd7bfb2761418ce3a5da61cc86fce24a2bb74bc6fbb75d3fe4fcd63c0e96f360c6efd85fb10a3da3bf4651a0956ccfaaa8e89471207235ed28
-
Filesize
6KB
MD523f482523dd5794396033220ccfb1ab5
SHA1712a9bb1ca63b42bfb1bbb897259026638366f28
SHA256dd0e68e66fdb66effc46dc2baacb4bb04e442232566a4b6b8839aee957997a92
SHA5129f81660db5684563e29e3efcf6772ea7ca75ee25da9c663ff84393f91f9f65f059f6494c0ff13aeee7be38713f9b254d30a76c6369e136f3e4b527e59b6f8faa
-
Filesize
6KB
MD57979192875ce49c81abdbb39ed69d296
SHA1d265911d373d901b1e80210b0a97fd9632b11d54
SHA256d275eb6aa09cac887c12cb41c354819a3425c028c672ae38d73f9de46d732e2f
SHA512b50aff2f4345c1156d8cc2fd8f72d3e2380267d90742073e938b165f07794c90cfef1dd1c0bda40b3f4aec7d14c5fe5d74a5c7d779ad144d859e6965f85ce872
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d084d10f19c107d77ca61e0f593c2f79
SHA13fdfd7ebd0e9d6f831875a4b97b0a7f6614b9186
SHA2562da21157c3b44d1b4ed5efc9101ba5f878334bd0d3a68ab605bbdfeb9129a8c9
SHA5126ad3c68e71f404718a38b247454c881d16ee18d65760913206722a8379c4043cc6b5fe025a598ccfc6a3a1ada5021ec3146baec86eedcf38678d17694a293def