Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
d65ed63359c26477d36afa6abad60ea1.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d65ed63359c26477d36afa6abad60ea1.html
Resource
win10v2004-20240226-en
General
-
Target
d65ed63359c26477d36afa6abad60ea1.html
-
Size
3.5MB
-
MD5
d65ed63359c26477d36afa6abad60ea1
-
SHA1
1036fa4d6e90d62086c90f6b41e3685d744d6f8b
-
SHA256
fa01d7a6f2be5332b17f1a5010b675e880187c4a21c685b9a180be395e11b917
-
SHA512
cc1a19a95698e688086a4ccce91cf6c97aaecdbe6745c3465cb4791f17f5d2f5ec48729749b4aefde4a45321370c94d641d08edd12fc97045b01331020ad03a7
-
SSDEEP
12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6Nyf:jvpjte4tT6sf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 644 msedge.exe 644 msedge.exe 2368 identity_helper.exe 2368 identity_helper.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 3624 644 msedge.exe 86 PID 644 wrote to memory of 3624 644 msedge.exe 86 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 2112 644 msedge.exe 89 PID 644 wrote to memory of 3984 644 msedge.exe 90 PID 644 wrote to memory of 3984 644 msedge.exe 90 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91 PID 644 wrote to memory of 2640 644 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d65ed63359c26477d36afa6abad60ea1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffd8b46f8,0x7ffffd8b4708,0x7ffffd8b47182⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,4443367133369592045,10282644114882825499,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2624 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
981B
MD5729ffc4de822e5df12391fca5bdb9439
SHA1f553b914713f572a2cc7e18381c689208372124f
SHA2564aba8f5d021e21cb7dcb9b5ca9d7b485adb55dbe0ef62ca06cf4ae60cb7b7c83
SHA5121b2874735878b11278c13299e1674ea0a81e8b0659c33f40a14f8f6f4dcbc83fa92a84dcdaaad1cd60b712c8782cd9fc96b8304dc91ff693255d05ee71c21abc
-
Filesize
6KB
MD59eeb8d8e49d45363b64987f81bd39478
SHA178d0b46f22243a69af379a38b32284e15b7c6dc1
SHA2569ff8eb861077c69eb74c24fd41ca15b288bc38851ba39b5ef65430deaa86f40c
SHA5126233d435488007f9ee1349bb6fbb26b2fd836bd6bb33585a5c9593879edd2c844b53c53e9a65418de6e3f39a7516f94ad3047baeb068767774c7af8f234f7591
-
Filesize
6KB
MD5dc93c72368edde412fe7d4edcc2437de
SHA1255b7b706d28fbda01ad1dddcdd4c369227d1b04
SHA25612d656d0727da34694cdb6b1451f1eb4561a3677f06a6991c1b228a88fc853ef
SHA512b1fb3cf6adc904431722c846f5358d1ea652072a6d6ffef480ad87c6ac456aafec4701bf15285b1c69e6391491962296d00852ea11d273b02ee0bb263445ad9f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50b14d7f4ab980a311807b34dcc761566
SHA13e833b5cdf2cbff3d3d9a64c85c50ac867cb0103
SHA256c1e6234fd166d724b6f9e699f4867e63d17aa07df56462d14d5e0b8fba6dd9ca
SHA51255c59fb6173ca44d057095be79f01d298f834e020c8aaa93ffe7e40866b9a2f631b39102de3337b897f44576fa253a935c868ff3981629a3a45fd46e03c8e2b1