Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
cb10dfc5f716ecaa2a3f0fac7bff6bd7.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cb10dfc5f716ecaa2a3f0fac7bff6bd7.html
Resource
win10v2004-20240226-en
General
-
Target
cb10dfc5f716ecaa2a3f0fac7bff6bd7.html
-
Size
35KB
-
MD5
cb10dfc5f716ecaa2a3f0fac7bff6bd7
-
SHA1
807608cd57eefd411ce3d22fc891ef06e2fe31d2
-
SHA256
38b865fb3ad64900c85d9e6e9f312015beb8642e1b805311f3e45f52f4018e08
-
SHA512
62e3bbb98475a124aea7bfce163a33b18f4db16a590ab6cc2fafce0a7f19d56418d3b566aab126c18db3b7a350fdd9205e707911bed88eb667e09c8319b1e9fe
-
SSDEEP
768:pCBrtPeCWgCIiA8f9GjIfuDSW3NfEfXCpsVxtWyAuQz:IPPeCWgCIiA8f9GjIGDSEfEfXCpsVxte
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 2076 msedge.exe 2076 msedge.exe 2996 identity_helper.exe 2996 identity_helper.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe 2076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 4736 2076 msedge.exe 89 PID 2076 wrote to memory of 4736 2076 msedge.exe 89 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1176 2076 msedge.exe 90 PID 2076 wrote to memory of 1624 2076 msedge.exe 91 PID 2076 wrote to memory of 1624 2076 msedge.exe 91 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92 PID 2076 wrote to memory of 3140 2076 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cb10dfc5f716ecaa2a3f0fac7bff6bd7.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcba846f8,0x7ffbcba84708,0x7ffbcba847182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,4357887537615716632,2028845739554045081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
918B
MD567b94a1ab34ed9b90d339e57039a2e46
SHA193bdd7d8c8cf066d0d1fae5d3f666f8c8407dee6
SHA25624fa5a2329da74be754e481a8e6e4634b10251c981169a4cc011a79e881e8066
SHA512df3522a4a5cbeb21244ce8ea6f6f302f9430c0e8435d697ebc7bf753f3dace742e5e3679d3903ded674ce3c2fa6e4c84f0de84ca21675f376f433ec27662b9cb
-
Filesize
6KB
MD50fcac449139b9e10c2a8c085ddbb3dda
SHA1f5875f7f55187797bc38eac9a6ba6a9ab83a16a0
SHA25617d2b01e2a8ca941224508290a4d4c7387833ece19ab2546b8d829e496ed08cd
SHA5126152e642357efb3ee5d4f0e086b29087813a65823ef0d8cccc6fb78ac7eeb26b509b754b9f3f9914b86f431f232eefaa94d2e772f9578e312a9657866ce244ce
-
Filesize
6KB
MD59b24acd15c308d3481f51fc8d5f76098
SHA1d4a2ba94b0a80ebae0a6224fec07f939d78311d0
SHA25676c7cac784fd3f9cbe6c2d487ae6caa1978c459f8745d4c86161069e9ff00a12
SHA51285cb657a046130e55f59672c7d3624ed081df6f89da3ac44cc416cb4c7971434667565dd272c135ccd8a4134b4c5ccabf90d1fc600e22d97de2590081ba847fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d408a33076f63e39a83c32b4d67e42c8
SHA1946789e050090a047c3b6e23cc4436f09ce7d086
SHA25604c798e6a47844d9bd023ed587224121efdec2863eb6750827a1cac66790555c
SHA512a80f3363509bd9f83a739f9b3ce7305c69f32d4583e1e180123b72ad5495bbaa0d8e45c5ba9f047639f09cc28128734c9685f2c0f2c69730f31594e5421c582f