Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
d75e61fcf1bab0f795d5961b53287e5f.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d75e61fcf1bab0f795d5961b53287e5f.html
Resource
win10v2004-20240226-en
General
-
Target
d75e61fcf1bab0f795d5961b53287e5f.html
-
Size
3.5MB
-
MD5
d75e61fcf1bab0f795d5961b53287e5f
-
SHA1
51f39219eeb15d09c58a08c83e12888f600894ae
-
SHA256
9dcfd80dcdaddcfb79aa31ce6ac844ee09097c7b408365eaee41ee1342981840
-
SHA512
b0bf5e1fd87cc17e7969966ef65a8c1763b866d69e44ef40de4dbab567994387b54ac38a841287b843e4e67da4d5e56676814b86caac8fb2582c13e7ab5cc25a
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NGs:jvpjte4tT6Qs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 2436 msedge.exe 2436 msedge.exe 4000 identity_helper.exe 4000 identity_helper.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe 5916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 4316 2436 msedge.exe 87 PID 2436 wrote to memory of 4316 2436 msedge.exe 87 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 2216 2436 msedge.exe 88 PID 2436 wrote to memory of 4696 2436 msedge.exe 89 PID 2436 wrote to memory of 4696 2436 msedge.exe 89 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90 PID 2436 wrote to memory of 4984 2436 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d75e61fcf1bab0f795d5961b53287e5f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb62046f8,0x7ffcb6204708,0x7ffcb62047182⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10710401597734277810,3580063675677198243,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
981B
MD576f3f2ae34f29d3f74a119ee22e8d60c
SHA1e3192193b547e2d1646c98dcf170b6f4446eebf8
SHA256e48ef8a2fd4abf6d77bbfb7f0ad5509223a88012721580d6d6c5df60cd8111d8
SHA5129eec45c9254006dd27863d9277943f7951ae34a54ce4483e176edb0a0336c231655458a3576ea7e231b811ae57b91c61ec9a92f2b7fdbba644a462ebf50e63c0
-
Filesize
6KB
MD57adcdf1df9f50fb63df2d09489e42dd0
SHA18993c1995c8668ec9502b5b6a6b2753e48c057f1
SHA25664bdf2aaa05d94e93f79db9f8856c1e913a1c20520283f0278d348dffc51db25
SHA5125486e3da74041de2d185188a2725218de00e5d6d7ea27b6125ebfb88a654adb359cf5cdd15ae020781ba295b0f3e526bb43e1bbe8f69f9bb117e573291c28d7d
-
Filesize
6KB
MD5fcd7e20372f7b9cff3413b048d866091
SHA129e1840ed608041ef56ce815da0b28de4c7ec103
SHA256689f816673215b824d3554521332d53f7ff0bb0b0daf02354a8853eb42b18cc3
SHA512198e835f8cc2cdec4ff4ab36f48840e3da95ca11a44004f91babcade7b2239d97c27b08c68396b398894ba2ea8c431442e74ab0d9a74c248c106078263683594
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5214514bce735ef07f76aef90bb4d3206
SHA1669f591bc502e0987cc00f605ef529d6aeeaadcd
SHA2563ef570387686eebdcfe3320783d386da4fa352f7b06350e903332b86f504ceaa
SHA512ee305568f21d90c49b6ee31721b181a3c7bc720f80f74878a3356ab150551ba733983266a8f6fd524986e8cfabb9dcedca32694e734a695a5984bdab3daf5c2d