Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
d3b046e1c5165ea23623ab2b2031c29b.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d3b046e1c5165ea23623ab2b2031c29b.html
Resource
win10v2004-20240226-en
General
-
Target
d3b046e1c5165ea23623ab2b2031c29b.html
-
Size
2KB
-
MD5
d3b046e1c5165ea23623ab2b2031c29b
-
SHA1
2bed58d41c2c3e12f4ee3ac76af82c2308139802
-
SHA256
10945084bffb2d21ba859f41fcf5c53a640a4c4e4f0b0fa93fd69248985614fc
-
SHA512
739742ccd82dbb6a8ac11d537c806fc9f6a1d1891dc9ce83f79b0c32ec10b68e485be31668031822b9eacf80ffd5d117879f7f50eb3900c1e83e00b077ca8f54
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4712 msedge.exe 4712 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 468 4712 msedge.exe 88 PID 4712 wrote to memory of 468 4712 msedge.exe 88 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4380 4712 msedge.exe 89 PID 4712 wrote to memory of 4856 4712 msedge.exe 90 PID 4712 wrote to memory of 4856 4712 msedge.exe 90 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91 PID 4712 wrote to memory of 2420 4712 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d3b046e1c5165ea23623ab2b2031c29b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa387646f8,0x7ffa38764708,0x7ffa387647182⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,15764245781980083664,3366987672983262452,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5464 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
Filesize
6KB
MD5cadf735f1ee4d06c4469d6a7e3eebfaa
SHA129e0dbf96a0b8552c7bb5635312d31c4fd723284
SHA2562f45508d2463835f403256f6f162086d8efe55e1439a00e8bcfa655ede5157ca
SHA5122ade32d9be646112b4fa46499f8ea0b8d047342e0811856152fca90a33198ceed33072f66716f65ef4da9e2dd666a046a1fcefe7fc1fea867bf80f0087a00b83
-
Filesize
6KB
MD5c1ea898c98e27232e597d0b7bc7e5956
SHA16760fe1c1280cc7030b575366ae8f3f058be215e
SHA2569e83c43dd0d895784c74555d223dd82f2ec7bfbb1f2b6eadb6e8fb12446f2960
SHA5129d037153af7c8ed3d11c188f9dfacbcf48f36286bcd3bc38d2568756d391e60803fe1552a5eb4196168e46bec80cfbb0b750fc72c435e0f1043be32d3f804551
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50c61c98ab1e935b735b34b66a2b64878
SHA1a110fe94f97cdc044e011ed19be813b1ca21855c
SHA25695b39fbe56aeac6259964e6db17e97ec879f36fae8b2708c034c52c194c6f6fd
SHA512adfec73033f387c76c43e3bb02da727a868516e8764816f15071e8c6bbdd586a9d85632a70c231f2ff5522cf8785b7193e335e08396b31c71a919fe98abe6863