Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
d5c11b00e7eeece8080dbbc57f32f05a.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5c11b00e7eeece8080dbbc57f32f05a.html
Resource
win10v2004-20240226-en
General
-
Target
d5c11b00e7eeece8080dbbc57f32f05a.html
-
Size
379B
-
MD5
d5c11b00e7eeece8080dbbc57f32f05a
-
SHA1
c73606eba547bdf621b4d98263847daa837d84de
-
SHA256
ac21b0c35fc8a2ee945b0204897be548f332261a9b14cf7926bec5108361bb18
-
SHA512
50acab2d1734c31256ca2d25a9dd56fc57521d80eed8fa572f1f23c1048aae841474f608f73d9cb18db5e500e2abbd555a6d546f092f4fd42e242931458e7357
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3484 msedge.exe 3484 msedge.exe 1952 identity_helper.exe 1952 identity_helper.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4264 3484 msedge.exe 87 PID 3484 wrote to memory of 4264 3484 msedge.exe 87 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 1924 3484 msedge.exe 88 PID 3484 wrote to memory of 3140 3484 msedge.exe 89 PID 3484 wrote to memory of 3140 3484 msedge.exe 89 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90 PID 3484 wrote to memory of 4800 3484 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5c11b00e7eeece8080dbbc57f32f05a.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fffd6d746f8,0x7fffd6d74708,0x7fffd6d747182⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4263039351872102945,1177248699615907046,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
Filesize
175B
MD5c489373f7c635bbb88d61b1ab4173a80
SHA1d489717bcc637e41392c69b137e8d6a68678a091
SHA25658389cf55624f3b1f5505e97a58e4c6f919d4cc967a8cee28880075c6c4b4ace
SHA512300667e70923335b1f5465323fbe6a9ccc66878790a53cc638213f3d2f9bfdd87fd3cb23d669b841b0ccd0d2c91757ce614758bcfed0303295777be98c92fc4a
-
Filesize
6KB
MD52c21ecac211a69b0f1e3d18fb321ac71
SHA14b9f9ef2e48d4e60fd9e36470ec3f0feae1ac224
SHA2563ee1b1088b1da9ca0c3ac46913607172e33c932f3c3101a16b5be773274f7e25
SHA512431791a653e61b00b003c22803f9318d7a8751c35b19428ff0a003aaab419b11dc277f85c5258dfa4ea6c4f1b7d1a4ad9c0b844559ce4c82e9c389a4eef886eb
-
Filesize
6KB
MD539fcd0e36b34200096c7cadb3c932aa0
SHA11bab3085d8d79ae64b5921c16350da6b8a30b420
SHA2568c4c2ba5c59c796db7916822c05dc57a262de570a90d942a952b945da15d8022
SHA5121c1c2bbdc9fa9f7c6bc4a84e9477316fc3fae38f0ca174065e802cdaf67ddf288f73fd2ca76cc8ff07b921c565e5c019144eeeaa444672d097eb104a57ddd1dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD567124682096c72ac492cff3379111948
SHA1f74f23552d99760d605354bba0ab0a8363ea1f8a
SHA2566eeae680c0d003ad844abccdbaf661b5e2e1fa667e0be286256dba3e026ca3eb
SHA5129df57b1cf16667087a18adf6fecdb83f7868a5cc90802b05aa7e19791912b3e981c0cb3a89dd8dbd48d10bac7657d5770f7e4b176fb0c761da3c7ce71a62e48b