Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
d4aa196e4d7c23e37dfd3c1bf47c1e79.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4aa196e4d7c23e37dfd3c1bf47c1e79.html
Resource
win10v2004-20240226-en
General
-
Target
d4aa196e4d7c23e37dfd3c1bf47c1e79.html
-
Size
2.6MB
-
MD5
d4aa196e4d7c23e37dfd3c1bf47c1e79
-
SHA1
149d41802a5adbf653c401c2ed2963001995261f
-
SHA256
768d28bcc9c4298c6f659835a1a2c8c87f41a27d26011c4ad15fde122b1f0a35
-
SHA512
8ce83e11e9dc78255479de7ed0e83ccd2ba958a64bd844fc146d9769119eb2b00bf246e7de687d37c448421487cb5b28910a726a5dd897db2855d428e8ed046f
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nl9:jvpjte4tT6L9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 4940 msedge.exe 4940 msedge.exe 1608 identity_helper.exe 1608 identity_helper.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2264 4940 msedge.exe 87 PID 4940 wrote to memory of 2264 4940 msedge.exe 87 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 4712 4940 msedge.exe 92 PID 4940 wrote to memory of 1744 4940 msedge.exe 93 PID 4940 wrote to memory of 1744 4940 msedge.exe 93 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94 PID 4940 wrote to memory of 1784 4940 msedge.exe 94
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4aa196e4d7c23e37dfd3c1bf47c1e79.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdc1e46f8,0x7ffbdc1e4708,0x7ffbdc1e47182⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14990920885031445215,8230721416597795138,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
894B
MD5a2a9028d47a412b1d031ee0b09c5a5f3
SHA130758b86aac51b872ee0afd32958458718099046
SHA2569df4207b9848e62d27efcd0afbc7dac2ce342688a46e4059a7b53b37df5149ba
SHA5124a8fc0ff9f967ebb5cd895716ffc7f721fe7de8a013c258be5c7db74602a3d55f2a48e05611402dc3db7b24d6d0f22f8fa213a7b19206e52220777c680c092fb
-
Filesize
6KB
MD5ac463549d2d6a0df8d9a9821114122e9
SHA1eab05f68101d426697c7af53392ca377597745d4
SHA256eef05585a09913b7df7b9857a0689d74da13b31c5598078d94ddd74771d6228c
SHA51219f9cd8fb301f6adebec03a3979f2d92f59cc92cae298d5849c6327b6b034439ce70ab160ac3c8f37f21d3409db5b9e3aae61663dc5a71fbb74e06c1023337b5
-
Filesize
6KB
MD50b7f634b6ceec9fd64de1f061467845e
SHA14f60417649c3427c225b13822374ca9444a91aaf
SHA256c6a28fca72f4b6cd6aa0ff6d397d970ad57509d1b1fa1db44d0e635bb1b13faf
SHA5125f5e005fb8bc49b4a807cbe1a59e145365bdf5b24efb2a9dcdf35ac6e03a19d73e67333c6827b273d58a9c756e26934ce3f0d17db218e0b6d0294a49ba9908a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD528c35a9b7f512c20882f981dfaa86ce0
SHA119e942a292fb6e9bf6cc622f940e78ae7451ce10
SHA256b83ae9fc91e368583a9c6081cc346a7dd8b53b87bdf8bcf99d2f7620b28accef
SHA5123e442655cc5c5d7a7b5b153564490a4882a1fa7f1843cb5c9c80852356b5b1fe7187e7312d40b4119dbbdc4d4c329a0772cd4f4cfcb01ca7f6f1dddf2fd7c5b7