Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
d7637360a2498034e692d1384bff91b7.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7637360a2498034e692d1384bff91b7.html
Resource
win10v2004-20240226-en
General
-
Target
d7637360a2498034e692d1384bff91b7.html
-
Size
3.5MB
-
MD5
d7637360a2498034e692d1384bff91b7
-
SHA1
327b969c35aa9e1d8ca489a855ba5c7c34e45c16
-
SHA256
0909f3389c5423e0c5d0e089a717bf632bd491c4c0d937d278b9a3e7c5241bfb
-
SHA512
158c570bb942c55416cb6f19dfcbe83aeaed6e07ac91916739d2e1ec5e21fbdb3f39bc17bed12a450f24244e52b1678a398cc83c35ab2c434b37d8d36b0daa58
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NI2:jvpjte4tT6e2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 4412 identity_helper.exe 4412 identity_helper.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3420 wrote to memory of 3640 3420 msedge.exe 85 PID 3420 wrote to memory of 3640 3420 msedge.exe 85 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 1920 3420 msedge.exe 90 PID 3420 wrote to memory of 3280 3420 msedge.exe 91 PID 3420 wrote to memory of 3280 3420 msedge.exe 91 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92 PID 3420 wrote to memory of 2396 3420 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d7637360a2498034e692d1384bff91b7.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad3d046f8,0x7ffad3d04708,0x7ffad3d047182⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,2393766568673614935,3611651398326923774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
981B
MD56378e191fa5667855b376305711be116
SHA1b166def17485fb62f9031a4a9895acc994aff9fa
SHA256ebd353468385f015370d21984e859718482544e326fea6d2b8df6aeb191d6d64
SHA5122aae6dc06006ef108770d256d7e997a438855aaed5cc9dc8f34b40065b2e87d26cd335d1c0875b03d4748931eb88732a1efb458b04cf587c9b1a4c609a09df17
-
Filesize
6KB
MD587bc4d5c313ba614eec6d59e876a7361
SHA19d496d65cbc19cc20eb891e566a1b4b51e49004a
SHA2568b00a1b61d2affc90569f0baaab92d6f267fdf0533c622dce1ad86f26fbedb24
SHA512609dca11de32c86d38b2d9465df819cdd5cf753848e12830846dccf9122e3654f4890328c75d410ddae0a0062ebc989c0773d15f050fb1ea6ee257383f26bb47
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e9f56f0f-8e88-4fc7-962e-0bbc526a8362.tmp
Filesize6KB
MD5f8d87f64923056f4b275ff91553dabf4
SHA19e9b6a08f136a3a1be45827f5df02beb04e26067
SHA256e4d7196123a2abe6e6f3d17412ecbdf9a40a82b46d3708fa8cb61fff8e7c388c
SHA512592ce43f5ccc29b94eeb28b5015e654cc84d1ea1e8be2e2edd1d51d00f8eadf4e1191fd4d5ebec40b70dd8de8e21028a274fc24f95050946b4bea45610723d7e
-
Filesize
11KB
MD5a46c8ad7dcce1326f919a9d13cd27ffa
SHA1d25a98cbc330e8557147a2a0f8c6aeb92722e2d7
SHA256ddfa9b3636fca17764cc3f7fb277946423fd62821751ff016385f0e229ef5f22
SHA512d2705e3b02f338864c1992220a9a95849932229ebdebc45f0d446f605cfe1599614b43ca9d5cd5157e73da1c338b6326f71abb9bc8a229144a3d7b4eb91ebc8e