Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
d67a83418664b30cfcc2d330deb8c011.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d67a83418664b30cfcc2d330deb8c011.html
Resource
win10v2004-20231215-en
General
-
Target
d67a83418664b30cfcc2d330deb8c011.html
-
Size
101KB
-
MD5
d67a83418664b30cfcc2d330deb8c011
-
SHA1
4926fab8715c635d640405f2057cdfa09322b341
-
SHA256
bdc6cd9b8c5c3a1bce2479aee39d497482b51294ea8854567b814a1eb4ab6cf3
-
SHA512
85ac7a51ff5490fff7b074d872ac86c3696ebac03cb387d1a5987609dd1a9a4496aaf7ccbc2b7447970960572769fce66c6b750efe893e9f7f58884d47584695
-
SSDEEP
3072:QdNqP0Df55323Utdhz95b+o+a2q0DA6Ldm:Q6P0Df55323USqI8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 3184 msedge.exe 3184 msedge.exe 4936 identity_helper.exe 4936 identity_helper.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 452 3184 msedge.exe 85 PID 3184 wrote to memory of 452 3184 msedge.exe 85 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 3836 3184 msedge.exe 86 PID 3184 wrote to memory of 2616 3184 msedge.exe 87 PID 3184 wrote to memory of 2616 3184 msedge.exe 87 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88 PID 3184 wrote to memory of 4840 3184 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d67a83418664b30cfcc2d330deb8c011.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed2eb46f8,0x7ffed2eb4708,0x7ffed2eb47182⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2332 /prefetch:22⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,4137015282210698929,278840678625811200,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5ef83f48cde29171c2b7966c784bec9bd
SHA19e562dadefef739a8390089b5879270f5693321c
SHA25659ba8f0e3555a66ed198cbb0a0eb5511cdae0a70f7168137525fdae0ae27ca06
SHA512c8406861eaa18e1dcf2125e8b2c753a9f7495fd636f81d927a902a81e6bf3e24d69237228441f229c5718ff37c4f1f8e5d227145cd9bfb966eacdeb7c3ca4297
-
Filesize
1KB
MD5dc13c269608aba473f987b11c309b764
SHA163b4a3f2556d69d01685af2d8b6661a3ca9edfea
SHA256ee2f102847acd76e302ce7a08a9c95b70545645dd71b9d4d0dea4cbe03a8a98a
SHA512c806e27dd8659e443e9100efc5183ce874fe4c51ddee5435eb9c7bd8d67961cd2d0a542b282a444bc4bb7a8f37530066b197a3053c0d0d9ce0e3bd1026b48605
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD53d373079bc3462aad23f828cca9480e3
SHA1c10b823f117466412b8df1553f9a3b7eb28c9bba
SHA2564fb4f09484e525c6ca5f50c39d77ea1459111fd2458d53b06955c372a6875c71
SHA51278c3986b7fbbdc3ca8452953eedc7de233b8b19c53cc2ea9363a336a243e3c0bf264ec6aa8786e5e0e8862fe14ed548469e242a3923aef1d347f0676d4f3b9bc
-
Filesize
5KB
MD5d2a24d74cc06533cd534872bfea6f923
SHA1636ca145cd3cc423c1058b65268dc5b503dc71b3
SHA25671d373cd768b26a827c31568282d7f2609b48f539abfd57ac0d96d23e0686da0
SHA5122dbf3666c9e9ec8c132438f4e047b63293e273f133249a73099ba821c43c3ee55d9af9f82744d0a9429076423a10f1ed43be5d350d11febada6c44b13ed1e9d2
-
Filesize
6KB
MD5be0cd640139e50c6c9a96d3f2083a6e7
SHA1d2c72f2a0019b3cbd840b80e3d6e122a3c150f67
SHA256e32e9bc35f30f004e071755881d95be381d3b6dfab9846b1fff7a4f849f70bbf
SHA512e725456b7ee1c4ab68ef1b2792bbf700d3c1e789d52f79703a857a32754f6f2a5385e69b8a7918af282940c84692f1375ffb26e2c7187cb0acb845a1fd36a358
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b9acb16685a48210416a56d3833f9fc8
SHA1229e2fc43a68d158364db661c54669b57f2ea16c
SHA2561557cb2778c6efa81c1fa1ecf43afab6d549453d543d4d1d27ffad359fca32c8
SHA51263940af1598c82593fbfc3ae63b6182bd229e99497acfa40159d4ab9436458fb95f9aa6904764f5d7b882b834a8556b8a058a4306adb1cb3cb98561129be3736