Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
d43da43f4fc91c808a69ae603d82c24a.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d43da43f4fc91c808a69ae603d82c24a.html
Resource
win10v2004-20240226-en
General
-
Target
d43da43f4fc91c808a69ae603d82c24a.html
-
Size
52KB
-
MD5
d43da43f4fc91c808a69ae603d82c24a
-
SHA1
18bee8d6bfe23206c68c3f3e162ce47e8df37ea1
-
SHA256
dcdba3b413baefdb8580f56d3050b26f8fe9b3eb58ae205fd97eccf44c45bef4
-
SHA512
c0e88cfe90f208eee0c913f2613bcbb4b34b8421d83fc89aab986277c5607201d358dbc0c1d0ca45106630a2c166ca7e44e2407e8ad20af00dea2901e48a170b
-
SSDEEP
768:dNkCK1LnA4gJJN4yyHwttPlucL81V1z/3+7CMu38+3hmE:dNkNA4gJJNXyHwttPlucL8V3Tf3+E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 432 msedge.exe 432 msedge.exe 660 identity_helper.exe 660 identity_helper.exe 6000 msedge.exe 6000 msedge.exe 6000 msedge.exe 6000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 548 432 msedge.exe 87 PID 432 wrote to memory of 548 432 msedge.exe 87 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 3172 432 msedge.exe 88 PID 432 wrote to memory of 1572 432 msedge.exe 89 PID 432 wrote to memory of 1572 432 msedge.exe 89 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90 PID 432 wrote to memory of 5044 432 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d43da43f4fc91c808a69ae603d82c24a.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d13e46f8,0x7ff9d13e4708,0x7ff9d13e47182⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14125987283991526291,17596748789785742319,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
184B
MD548a5205ea7084e4669d1dfec11e39176
SHA1745e063a79bc4848b2cbbcef77701a29f24b21ed
SHA2560db21e261d61b7dec785e3aef5bcbb21e67560e61f182cbeb10a23d15eb8dcd5
SHA51256080e880c3b6e807fb7ac94c4f21aa3eb4d5a3532b38f547703538c6c6fda5439ad5f8bb6e746fb9af5d740282bcac5d84b5971db5c66a93837c78f325eda33
-
Filesize
6KB
MD5b33748486b9f6ae18773776c3af6fb00
SHA15713d2395ef5ccdc90825003cf3df75bb4efe927
SHA256c83359b3b51df7fc4183b0a08824637d5be2b3fe140948b8d8c3121c010e4227
SHA512a1adbc3864ea87601e1a6cf8fb4474bd0609ebace8bdfd0e7e7b6f5de6d02bc67f0cbfee2915156864a24e3848fe006c17b747196eb1e33fef47e251ea32dcd3
-
Filesize
6KB
MD5dabdfe3a47151a629006bb12421b5917
SHA19aea21bce64dc431aa84acfd33958bb8c07a7712
SHA256b48cc6c459abddc58f33f2132f95abdc1bbf865f6c246cbbb513476d506003f6
SHA512ce095b6dc960e3f5716f7a55e5a36092aa20445bb36edcbf94604b088e0d3971e2655db4a2ad132faa27712e25419e1944f44ac8073eb038cfa648c34af44dc5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD582fa017b07412d3fb17c9b74feff0fec
SHA178651799850df6800132ce40d494068d787f6ac9
SHA256005be60a4d05d837cd079c8598864807c025cc7aae719ad68db83f0b8f77d019
SHA5127f2a414c0578d37b66ab08596018fc1740ad9c3663bcf0937ce8cd26830ad5bf88355ad6e03e2c13e5a32f39bc99459b084b7fe03987a22b9ff3c11263ed827e