Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
cc24580c93e13e1ee43106b03dd0bcdb.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc24580c93e13e1ee43106b03dd0bcdb.html
Resource
win10v2004-20240226-en
General
-
Target
cc24580c93e13e1ee43106b03dd0bcdb.html
-
Size
53KB
-
MD5
cc24580c93e13e1ee43106b03dd0bcdb
-
SHA1
f3aec84f99412716610bf0ae5af34273760b195f
-
SHA256
e18ffcace800b51cdb8ae198e54a3899f02cd2a554607420c16bbd6b10987224
-
SHA512
d3a8db5b0305f5bbe174f1d9d7c6b0287e36b8cb43ecc733457314fce8d61a87ea0769f7961a8778e190e0be25f376485e6ef998b63794b9c3636777e9c982ee
-
SSDEEP
1536:CkgUiIakTqGivi+PyUkrunlY163Nj+q5VyvR0w2AzTICbbjoq/t9M/dNwIUTDmDV:CkgUiIakTqGivi+PyUkrunlY163Nj+qF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 4824 msedge.exe 4824 msedge.exe 844 identity_helper.exe 844 identity_helper.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 116 4824 msedge.exe 87 PID 4824 wrote to memory of 116 4824 msedge.exe 87 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 464 4824 msedge.exe 88 PID 4824 wrote to memory of 3580 4824 msedge.exe 89 PID 4824 wrote to memory of 3580 4824 msedge.exe 89 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90 PID 4824 wrote to memory of 1452 4824 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cc24580c93e13e1ee43106b03dd0bcdb.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5207152058162742067,5857021779298052324,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
402B
MD576116c7bb734ec7d445a9bcaac9f1285
SHA1b8a3d927f8b49afbc2368f94338afa94fd670277
SHA256c007da4102463596c72d6318578aa0478bad87a0303f60183ba2ef11b95bfc65
SHA512b535f3663596a412ed681e87a1e7f903676cf21b7c0a0c3a546773deed23ddb69c07c2bc6779825df534329e900b73a8bf4790790990991a7740c16e16bca0a4
-
Filesize
6KB
MD5844aeb60af1f246f002f9f9ff13bb488
SHA1c2830224d2aea1986778b58ab8cd473b562d8fe9
SHA2564690057f6cf40b077f3c3e2ffbf58e1e9d9826e9235cebe2c2c72e2cc0973337
SHA5128d665073acb7f535cbc4928ca0610e26a7d8b29ff279ee9c761dca0b8ca7a404687fb0a01cf53a232575fce3d3739bfb78fd27e8f5394889a195d080fcfa4409
-
Filesize
6KB
MD5ac0a19d4b9ea3fe2fc667edc165d7801
SHA11c020ccd79df0530c71a1f2d620ae6df43d4cd84
SHA25603aa9495aef6e2a266e4b0a12d14d55c493b0ffc631ff45b829619d2c9857841
SHA5129f8a4617d20c122c81888df1a9e40dab30efe8e835974b168d0393b9c03fdc9a45c3aa6eae34f12c9516adf08a19e9ad1410482a8e1d00254fa4b765e7c94d4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54ae204c20b573b13f89b4047f33d75b3
SHA16893aad10ff18a7de9b5782d213221cfc74fea27
SHA2569b45180f70cb4cba5b42802d453f5fd7b78a113a2ad8f3b6f48c321597bff460
SHA512f78e17a924b55c701e066012c72753ec20269512ed8aee9cf6a307c4fa6184c87a577a6cc5403a5afcb889cd540c864671b11a6d3b2b98c5f2ce3a109860d4b8