Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
d59c902c72278841fa9659f7b5c544fc.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d59c902c72278841fa9659f7b5c544fc.html
Resource
win10v2004-20240226-en
General
-
Target
d59c902c72278841fa9659f7b5c544fc.html
-
Size
87KB
-
MD5
d59c902c72278841fa9659f7b5c544fc
-
SHA1
eedcf16023d9c8927147888136cdc0164e0a830f
-
SHA256
7d3b90b813ca4aab7bd0788bfffa21ff40bfbc4fcbd0207aa09917c9602a4bf5
-
SHA512
6706a1e067e0d3be3f3102228018d1e2ba2141f2b358c06a6bb06b4d5e7018a726eded5f3aac7135bdb20432fb100ac5b3c4b0b0b9b1aca738c4be7b7ce64a34
-
SSDEEP
768:gylkvgOriWNzvoWgGn02ZeUxs2ZMEe7MeVpor+Cel0WpK2SGHO:gjvR02ZeUxnZMEe4eDdCeyWp5u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 3448 msedge.exe 3448 msedge.exe 3092 identity_helper.exe 3092 identity_helper.exe 6104 msedge.exe 6104 msedge.exe 6104 msedge.exe 6104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2916 3448 msedge.exe 86 PID 3448 wrote to memory of 2916 3448 msedge.exe 86 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 4152 3448 msedge.exe 91 PID 3448 wrote to memory of 1660 3448 msedge.exe 92 PID 3448 wrote to memory of 1660 3448 msedge.exe 92 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93 PID 3448 wrote to memory of 1132 3448 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d59c902c72278841fa9659f7b5c544fc.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb191b46f8,0x7ffb191b4708,0x7ffb191b47182⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4861408954115466032,1288897670823252780,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57740a919423ddc469647f8fdd981324d
SHA1c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA5127ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7
-
Filesize
152B
MD59f44d6f922f830d04d7463189045a5a3
SHA12e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA2560ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA5127c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d
-
Filesize
20KB
MD57495f57473662645a5b2fff9a05b72e8
SHA1a9d94e4b2f43ab30df0378a3b656cdd23ce857b8
SHA256e8914e720a0f88c352b4277f42cb4309bc3184c4847ff66eaae450a48cf07a9f
SHA51275a70c662740227cc50c6ded947bf667f667ba28b57ffaeb133a3b37b261488ae6cfa688561d78308a13f09b544b78b4b471193c202b44b1b2e3b6f08963ef32
-
Filesize
44KB
MD5c836019fecc97d15d849325875cabb0f
SHA1ee5e11847241e6e8e4d4aab3131117a41c37ede1
SHA25619b5e38ea10f052b4e709990c7bec4c7b97a4fb061f28bcb95b092b753d01d7d
SHA51293c37c4236f9a5e9a096fbbe25d3a7e9977564d280f1afd175d0016c7334b92d994d32c91f2bbac87ce91843f2388e3048f46ebece7ed5db9d8aeecc681475d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD532bbcc7bb9a7f9a61a0e3ae788cb6ebd
SHA107eddcd57f36ebe684b4553ad0688b5ee07ef42a
SHA25683b4f459b4ec6cae7aee54bfc09c65f6b6aeafcc233f58cb21dcba9b65271374
SHA5129bf01270c9aff4d804dd0205b98981882582d231c42888563226fd01d2f65a833202a90f7ea501b233e4d1926291a86b16d5923873f5ef206be855a307f8bc0f
-
Filesize
1KB
MD5805341c1d2b45f4e3dd53163f7c57036
SHA1df48c81a25e5b14c14fc2796d32201723cd83a69
SHA256d58b6a181b41634b8606c9959bc0189cef99985a70ee5a1c2fcc9d8cde73d513
SHA5123fbdaff5fa4789e3cf8c51afdcd6d4adee8b93068dbc4a13b816ba8d93bf2f12c35d51b7d35ea1e3d229f49b11d31930528289bfbfa94e075b505b235bed7862
-
Filesize
6KB
MD5d51c3ccff4fecab107036e945e43bb04
SHA1c918701ca89edd07575d5326f18916edd6ad5d5c
SHA25642deafdbe81f00c0cd0c9188661e99bc78897dde12dbfb61b070b599bf6a4cd9
SHA512c2d6944cbc07529fe9c61acb9b5bdbb5540ad0e1f61da504d003f9ba423e98c97e015236a8dbc311230c158371ab03b2f4c748fb37e3588786d01ecd81e17b1b
-
Filesize
7KB
MD5d259e6999704ee4778a8bc120d7ebd61
SHA1133113bdbf7908a1bedb714190441564d5b4e435
SHA2560563ceafc2d2e3fbf3bc06213ce64b43e7bef8e31ddaf0b96d2865233aa37590
SHA512be073c7b900a91099a6cba9ea32e86b117c1b655212f37f0971ce3d5677578de45c5d945ac2a51736a93dc12e1b47c00c29fcf7a08ddbef65db1e772e90cc0a2
-
Filesize
7KB
MD5874e5afeae7e50bb24b52f87ef2233bf
SHA14d3ec48f079657de682a3e6ac09135921a3ad038
SHA2569e651234c655391caa3dfded66f8f29de42182ac052d3ab233fb5eb5c9d41f72
SHA51291b891ff9c42963b6bb80eb450763866ae8d952dff7898859f1b0510f0ad74a6aac1f5dbf7135f38685bce0a23ff3bd2e2083e2778cd975714a871e59a525218
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55e12b4ea6596c3dbdc27eabeb4cde0b7
SHA118bf04715e846d065e66013b61eb6d9e07dd92af
SHA25657eb67540072fbf8c6195ad501cc002a00ca311fa0ab33a85b36bcacb954a6cc
SHA512f2e03bb9a7bbed097e5f7ae712d3a73bd0fb335f073bc6060c5dce40c2d033ed265ce4bf08e52b2621b6b0f041f27f8bc6637e28bd23b04bdafc8ddcc88e955f