Overview
overview
7Static
static
7StarWH.exe
windows7-x64
3StarWH.exe
windows10-2004-x64
3data/Metro.htm
windows7-x64
1data/Metro.htm
windows10-2004-x64
1data/Phone.htm
windows7-x64
1data/Phone.htm
windows10-2004-x64
1data/Timeex.htm
windows7-x64
1data/Timeex.htm
windows10-2004-x64
1data/Worlda.htm
windows7-x64
1data/Worlda.htm
windows10-2004-x64
1data/新云软件.url
windows7-x64
1data/新云软件.url
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 18:03
Behavioral task
behavioral1
Sample
StarWH.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
StarWH.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
data/Metro.htm
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
data/Metro.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
data/Phone.htm
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
data/Phone.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
data/Timeex.htm
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
data/Timeex.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
data/Worlda.htm
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
data/Worlda.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
data/新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
data/新云软件.url
Resource
win10v2004-20240226-en
General
-
Target
data/Phone.htm
-
Size
15KB
-
MD5
995ab369666fa2f33baf93bf7af9590e
-
SHA1
e244609eda3ed992a0b900f9a489b9a617fb5504
-
SHA256
abaab8fabb6ba9de1a94946f1336e95917a54c73321c59a9fc26ea57950f5b64
-
SHA512
eeeca5c737af7b02a1ba50ac4f3341fec11a04b5b2ede21d16ae92ddcc4f5a288de9e46b670db097d3188570dcc86675fec0a766137fd16aef990e274ef23943
-
SSDEEP
384:A6fuJvrJH4OJ2La4b2Cwv4+2br284pJH8J+49JiqJg4eJxX94CfDK422DNu4fIUs:A2Z8E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 3364 msedge.exe 3364 msedge.exe 1436 identity_helper.exe 1436 identity_helper.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3364 wrote to memory of 2176 3364 msedge.exe 87 PID 3364 wrote to memory of 2176 3364 msedge.exe 87 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1840 3364 msedge.exe 88 PID 3364 wrote to memory of 1072 3364 msedge.exe 89 PID 3364 wrote to memory of 1072 3364 msedge.exe 89 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90 PID 3364 wrote to memory of 1196 3364 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\data\Phone.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xdc,0xe0,0xe4,0xd8,0x108,0x7ffa3f2146f8,0x7ffa3f214708,0x7ffa3f2147182⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11540850597287058831,16327113756602467586,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
6KB
MD5586c71116dec533179d913c099d9f67a
SHA18cd3dfd685cb6b1c79f51e6d36fc2c1e7b09b5f9
SHA256dda524c7841e5479dcbc09d0ee8fc4ccfc00fa4944f299d1429c3706b9f9fdfd
SHA5122f9c0710b9784f5397fd1c0f6cd89dab2930e0c28af1b309169667fc31b6e8b7e32e5d46ffceff22f5bc9234bceaaefe0742b86d9e9a05923bfb24182775c682
-
Filesize
6KB
MD527512022617da96aefc9fc37eacb700f
SHA1a6dfa4485af229ca77438203334f334ad1a62b32
SHA256aa32f03a9641448ef47744b5b83b47b323342e4b757f1953ac7810ce7114a2f0
SHA5120121398b3a88156ff7ee8f2b168c8d107c58522316f42ec1b6560406e66ff49a7eaa74ca245176d20f182227d2358feb7d45b7ce62d3d9ab549d57078d98c7e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53997605530147959494651abdcc6052c
SHA11ab3075fe7d03755cf601d0e1e4e64218934fe5f
SHA256c50179b46abfc593f98aae74fb05fec790d5e3bd5a80cb3a215357c4b282b761
SHA512511ff1f7bd45d85489d8b62d9461236a348b9f95f822b83693bcba183c8db12c669b738540f383dc3eb6dcc298dba84ad5eb493a9b55d18dccdda69f357b078a