Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
ccba7200193c56be90f22502edc51615.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ccba7200193c56be90f22502edc51615.html
Resource
win10v2004-20240226-en
General
-
Target
ccba7200193c56be90f22502edc51615.html
-
Size
28KB
-
MD5
ccba7200193c56be90f22502edc51615
-
SHA1
ce1c2df7dd15ba49114889bd6bd355b6153aeb49
-
SHA256
e6923d0faadd12410eb63af4eb7402d01312f33fc4ec8739a2d365ed8ec8b415
-
SHA512
c0d1bb0d2d686df6f67c6ea7c8c6534f3ce52b8373667039196a9bc17e4f1864eb2f618b06f816e00684da8f6095f74f0175d68518a105e8e669ab474ba04bdf
-
SSDEEP
768:CJ7Ch5ycCH4O9ozSjl3XG5qBEzLB015j331TGPe:CxCTFrWnlnG5qKp0H0Pe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 968 msedge.exe 968 msedge.exe 920 msedge.exe 920 msedge.exe 3692 identity_helper.exe 3692 identity_helper.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 4580 920 msedge.exe 89 PID 920 wrote to memory of 4580 920 msedge.exe 89 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 1204 920 msedge.exe 90 PID 920 wrote to memory of 968 920 msedge.exe 91 PID 920 wrote to memory of 968 920 msedge.exe 91 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92 PID 920 wrote to memory of 5116 920 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ccba7200193c56be90f22502edc51615.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5cf146f8,0x7ffa5cf14708,0x7ffa5cf147182⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12588005314123567925,10730781131786099303,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
6KB
MD552c44478e3eaec7528a125b5b6aee007
SHA1f2022979e69f071781b119776b66fe1e6008c44c
SHA2568748896932288ccd8a3596455e79ebf9fe907aef2673283e085430729c1e91ed
SHA5121eaaf38ff2039ab4e4a7b077f2bc02ec9321e44a0d05b01c26c94f0744963d93fbf0a69221898fc4b4091eca72dc2a425f466d8b62cdf54799fa22cfbb170280
-
Filesize
6KB
MD5a359e4020eeda47489941096691bbd0e
SHA15a962c187cc5a49f60fcfddc0e5c31bb90c9697f
SHA256eda101eb5b7e37f3032cfc06bf35bc63b6bd5db6d8b660c93d056083af7ca1b0
SHA5125b960f330d6ce675a43dc0151626ba26e2c6734bba903f50caa6b9236402ffe48cd9ef4eb1a31e35d5f6b3906a2b86f2880a1f614735cc3c2cd03fb071aa3b83
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59cb8fa893732446360164a4050738f9a
SHA1227eec502c1092babcc78f0386b8e0935c832cd3
SHA256b61afe52c110bfdc6b71bf3dcfa8cae0096d392187a29f31ab60e36af5959c58
SHA512cec01dbc07bcf970a6d50fab8694d501839907a5f67cae2cd88f5e4dd3e5cf139b52aa29c73d7650cf5a41ec811def6fda201748ab917560706f3b55822866a7