Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
cb25925e395056e745737e80120d988d.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb25925e395056e745737e80120d988d.html
Resource
win10v2004-20240226-en
General
-
Target
cb25925e395056e745737e80120d988d.html
-
Size
18KB
-
MD5
cb25925e395056e745737e80120d988d
-
SHA1
27959424f4b6fe599311f6b78ef021da4fc745c6
-
SHA256
a21e2e8eab1cc40ce4adfd4dfeca7d77a45d9ee7d4d2553c61db00041bd3a4bf
-
SHA512
fb7c90ed4300858f1d50a6f09f27de8c0bb61d0b9e728092e5188835ff0de5f3256089e07a1d5ad6fbcab002b14d293559567d46016cafefbad7e766e979c40e
-
SSDEEP
192:YO0qeN/EXl98A6CfbvFnxJrVMXTkUaaqptgpTzbOF9TUnCtctCGbOF9TUnCtctCZ:FXlqATq6F9TUCmkF9TUCmI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 2852 msedge.exe 2852 msedge.exe 3800 identity_helper.exe 3800 identity_helper.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4736 2852 msedge.exe 91 PID 2852 wrote to memory of 4736 2852 msedge.exe 91 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 4044 2852 msedge.exe 93 PID 2852 wrote to memory of 1580 2852 msedge.exe 94 PID 2852 wrote to memory of 1580 2852 msedge.exe 94 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95 PID 2852 wrote to memory of 4936 2852 msedge.exe 95
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cb25925e395056e745737e80120d988d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffbcba846f8,0x7ffbcba84708,0x7ffbcba847182⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15958314519361320172,12331971412034227151,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
6KB
MD50b540b5fcab815b89d50ea42229b0520
SHA1b0b794cbc52ae2ad99aca2b33db0d5326b0636db
SHA256c67127be10974d34af91a9d012fd6a71df07701b6602d5b72f2080f3a37e7a8a
SHA512010e52dd22cff266ebff8a9616319ad573f975b295855a3c5e978b4366a8107759fd3a5b6cbc7ad5f0ff74b0348ce9d3b218719e1bce1c165e5fb8a70fd42415
-
Filesize
6KB
MD59f9ce5dcb0a772d09a048774d00c9521
SHA14edff5522e6fd950a77c9b1ee3eb23c194df6ac4
SHA25614cf692df95c44bc7e708af674bf25a7cd6ccb5dfaeef4f23bc4e79ebd6ebfa2
SHA51241af56e6b57d26edef91a25ed868bf7b01767d9114fbb38b1b054edf7ad0cf073a9b5878407de213b48d119ffcf6141ed86bfca46d7aa88eece68f8478039878
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5d8a87db323832dd44432be03145bcd19
SHA1f95508dacca47e0b78a90bfe8f84a64daf1c6fae
SHA256f082589e1f943c5e9dbd3bbb9e8821e21137b5e592ea60b22774cf39fd945db4
SHA51243f8baae1065afbef76ed52c97bc21fd762bb61a35dda469c4f1e18f3d92aaaafaddc92bdc30e4d59f05720c08eb3c61d885951aaeec5368b6d7449bd99d8cff
-
Filesize
11KB
MD5e20625d009a3431b4be94f4fae39a40e
SHA1ddcecbe3c187499b2baf54f2c90f3a7575283c6f
SHA25678cf710f81e1549189eed712e53e934ae6466dc2465bd166138f1afd745ff3c8
SHA51287e04ebeec37143f85e040a8a4181e7958a1493d86d5fadceac590e04b278f346a945890a29cdb9b832d78bc7057c61261cf534ba1d8139198aac8a424a54059