Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
d70c965c5381bcf0326d15f8f042802e.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d70c965c5381bcf0326d15f8f042802e.html
Resource
win10v2004-20240226-en
General
-
Target
d70c965c5381bcf0326d15f8f042802e.html
-
Size
56KB
-
MD5
d70c965c5381bcf0326d15f8f042802e
-
SHA1
8c2a096979d75d7c658d70ef78a4abcc06d2bb97
-
SHA256
b459dd305c3e71ca362a5ea3930cd88da2680c95ced5e451481925e10e831f82
-
SHA512
435c4edcb41054ce983ba09639914c76cf0a32b8263873447096b3e2453bc8c15b9b0f74d613eb66fc8ec8118dc283539b005f88798424aea20c0119171cdd8f
-
SSDEEP
768:VztuztxztjMdHf02VQAzt6zAR4mz6Gika0v8AMFRz4k/sbddWPZI0ztM:CMV0mR4mm0b6i
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 228 msedge.exe 228 msedge.exe 2324 msedge.exe 2324 msedge.exe 1816 identity_helper.exe 1816 identity_helper.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1388 2324 msedge.exe 88 PID 2324 wrote to memory of 1388 2324 msedge.exe 88 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 4676 2324 msedge.exe 90 PID 2324 wrote to memory of 228 2324 msedge.exe 91 PID 2324 wrote to memory of 228 2324 msedge.exe 91 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92 PID 2324 wrote to memory of 4004 2324 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d70c965c5381bcf0326d15f8f042802e.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9289846f8,0x7ff928984708,0x7ff9289847182⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4133698856743779562,14640345023675779400,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
621B
MD5a417d641b0841f61ba96ef5faa609d6a
SHA1e3851e15384df044b0e1e473fd38cdde7160b3f9
SHA256464b6d028912f82268e8ce4d438e04f358b2641df8089b705698d5985115e3f8
SHA5121da9c1abf1852d6cf85fda5791a02802a6e4caaca8396048e72de6e318495b04456263528f5ea801fe0756f82e21bed1b0d3710a0da82fc20e10a77076badbbf
-
Filesize
6KB
MD5308317077bba534de465cf872e0e62e6
SHA10e573ec27d53d5d4b4edc0a1fdc39160b93d8f80
SHA256033729bc335b9aba8f6cdcadb769be82e92efcb4974d8238773160cb99f8a33a
SHA51209e63ccc4cd5000da8b342e08c64304da2b1f2c00726a0c548b6cb80472ec034cf86f921a97c631b32b373f829a2990284647c039597a54a72d92564c7fd572a
-
Filesize
6KB
MD5daba8b76e75722df344d64079976dfd4
SHA18918a7b614984a78ff89c78c8a4965a56ea94a15
SHA2569cb7b4d13e40fe1bf136993bdfbdc76406d4b51178187519ec023707ad4118bc
SHA512d17773490bb6ab07c98c51676fae1f041b914880985b1bebe2f307beacc7a9ded0782375b7f519b5f742b22a01462fb6c74b3bdd87d368ab2b503002179d0243
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a8197b68-e39f-46f2-8334-09f1dc1fe808.tmp
Filesize6KB
MD52cdfdc016ee365573cf1221c1ca54aa9
SHA1b04a76daa862feb96b9cbbaeade97ff99a3b4a96
SHA2567cee402734e6f2ede27771e926230ecd246564ce561b0b3fab40b3f03302ab2e
SHA512354fce7d893817636a306716192b01e61ddeae49683d4ae331080eebb0b4798877e67b66366d4469da4ccaa0f9fc5c7d81a0564c073241af6c81e59c0982b1b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55296e80e68f92f22f69d6ad8804cf7ff
SHA186b668446b28eea07241c058ec8431828b42ec32
SHA25660a8474474ad95be002577e52fa860c46779b17f0ee96262ee938144233b4d32
SHA5126cc7fb1e84c28184690fd9784707b0dafd2347debfefd635a5adb40e28e6664fa79826c5329a981750499a4f48708086244d6e91bdb90e94690d39b82093cdd4