Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
cb9abb7675add7b4a4d0eabc8e29b838.html
Resource
win7-20240221-en
General
-
Target
cb9abb7675add7b4a4d0eabc8e29b838.html
-
Size
73KB
-
MD5
cb9abb7675add7b4a4d0eabc8e29b838
-
SHA1
2c26daa85f0f256c5a43a7701b0b242a5703643e
-
SHA256
e4e520bc43563f33c1ef0bb3fe0aa2294a7a2cd0553500309ab2c5565b4673c4
-
SHA512
d63eb0b5dd30fa89b71964af32dcc850de2bc5901ea47cc16b701cbe1b37ddd95d3390afe87b6f2ae0a90c0776fc896b767ddc54ba67b772de6583d6876a8976
-
SSDEEP
1536:3mYXQxG52Y9MD22NbfmategNiXOAcktDYDoTezhU1BJUCY99tdGGo4ONyaP0tqRT:3kxG5ZWRtd9+AwDV
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc 233 https://jira.ops.aol.com/secure/attachment/688199/failwhale.html -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 1372 msedge.exe 1372 msedge.exe 4772 identity_helper.exe 4772 identity_helper.exe 5324 msedge.exe 5324 msedge.exe 5324 msedge.exe 5324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1616 1372 msedge.exe 84 PID 1372 wrote to memory of 1616 1372 msedge.exe 84 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 988 1372 msedge.exe 89 PID 1372 wrote to memory of 5036 1372 msedge.exe 90 PID 1372 wrote to memory of 5036 1372 msedge.exe 90 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91 PID 1372 wrote to memory of 4976 1372 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cb9abb7675add7b4a4d0eabc8e29b838.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd205a46f8,0x7ffd205a4708,0x7ffd205a47182⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5521251488296959766,772592121526611558,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5750159bc614be17026a5c00bec57d186
SHA1fe72b234156db02ff854e5b6c0698f86e41a0f29
SHA256c2a29d18f8b2ad2a536df5b6a55d3ac0d5f204a69754a899f213b0619cb5174e
SHA51291932b4570e12d4d2255e882fe3d6594f9c4ecfbb9941ed6dcaf91de7bef0a14e0b8348f5fd91bc4631d1e7c94fb168baeb72b6dfb605f53c5592f1298ad8fe0
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
990B
MD5fa125255d87ff1ba0592ae26704eb6f3
SHA19d6efb1f0b8b2a0c7524ee1ca595a07484cba931
SHA256f4a4b90729b7e39da1c0d34fe16a01ecced04920cd1dd03601db05819765d325
SHA512a8775b31ec9c9693ed962e777023c04f2772c6f9faa2a231f284a84065690ee6a7583c88a6b9ada90404efcd46b44723414252655a6efdbea5ae8525eb69153c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD560a830240371f1f343df87b50de06835
SHA19032b774334713061482022a3958f76f0c5e2a15
SHA2568b9710fa2c59e9ac02c5abd78103fd260228860db94c577f491957108d4b5a09
SHA5123d57722c95a9cf1e694276e02d7f02a277ca47b392e309193fd40518aa56de1232c061c8861a3530046e86ad5b392cd47cdc169f8607f6fe4b4c30128daf6981
-
Filesize
6KB
MD5a2ecb670ec64aa591db0b326ac62723c
SHA1140cfb09fda381824a086e6d5dda208b506a7125
SHA25682b25e3ba041c95c547b9d298bba8863deae75eb8aa66ec8202fa2c98f2c5f43
SHA512aa99efeecbb4dbadd2508f2e5a86046e2dab228c1fd70ae812c1f9d557efd96d48448ed83d127cca976c725e4df9be808ef65d13f119bb8d945c2cdac70713e0
-
Filesize
1KB
MD598ca332a78d08b9d38f014c715cba632
SHA1623920adff79aaad7ee3b31551564452c57b7243
SHA256cbcaf8b9c4238893af5c6a645f8d8e84f5515970b0aca8b2165e2db399ab7f61
SHA51247714707146e6504ec16e927a112750b8cbac205a34feb3aaa6433a7812e21470855248daa66bb2a6cfcf1a7f291c59c4be853d6f54a7e599d371303dad6b04d
-
Filesize
372B
MD5725d5712b7d69d5ca253eb0862d31214
SHA104efbea516dbd3d4b3f23ef6122e7ad06d7b22a0
SHA256e29021db28a8a68b861ebb2a74325d69bec97657165363ad9434f1715b96c3f7
SHA51207b83d847c90a49bbf2e16ed18c55635488583f2d0d3e04ac073350dd569a53e913707283d586a482e1e391d26cbe6bc0b487b7016f8d49b0fde9fc4740b34c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD591b1ea42023155d843f89c6e1d188efc
SHA13c350b652ddd493a4f2a6908597641e7dc916d8a
SHA256cf6351b6de070e03f62590f4497e847f9c61e9cbd498becf18679d2fd11ec85d
SHA5121833a55d5063b9d7c33e5ba36f14b0914d7a7b984c638f39e6066224419386a4dea35acf6479889d1fd830eff212285490fdb6a104b2d83479866abf09caa727