Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
d769b49fb364c64c3d0bd6a2290416d0.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d769b49fb364c64c3d0bd6a2290416d0.html
Resource
win10v2004-20240226-en
General
-
Target
d769b49fb364c64c3d0bd6a2290416d0.html
-
Size
15KB
-
MD5
d769b49fb364c64c3d0bd6a2290416d0
-
SHA1
01722caa429b293dcbe1c2cec83295791dea3b32
-
SHA256
e1e63a07caf5c66f082fb57a43cbf933a5ff0657e6a73c5b5f851e6a2a665f6f
-
SHA512
b4c54b18563208d92b2af90a8c1509fb7f7d4505b45f024897cad545f82c4993d61e83464553c08cb543f8d93a12e3895f9b8b5b2a709e6094d00a1c16a203ea
-
SSDEEP
192:qdwS3ZoWmrvt+nR40g8Ba2aWn3eiBttmvscgHe6VFAdjKcX27I9+P0YEn5ugN+9D:gNYgnR5g8vmvx6Xij/sGog89UOjL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 4520 msedge.exe 4520 msedge.exe 3084 identity_helper.exe 3084 identity_helper.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4556 4520 msedge.exe 88 PID 4520 wrote to memory of 4556 4520 msedge.exe 88 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1196 4520 msedge.exe 90 PID 4520 wrote to memory of 1384 4520 msedge.exe 91 PID 4520 wrote to memory of 1384 4520 msedge.exe 91 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92 PID 4520 wrote to memory of 4296 4520 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d769b49fb364c64c3d0bd6a2290416d0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff897b846f8,0x7ff897b84708,0x7ff897b847182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,4420562207814645753,5704515943894276294,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
6KB
MD5e564d38f73de043d35a84b09f2cbf41f
SHA154e5028ab755edff7c179698bd3f9322c2e02daf
SHA2562429d655f85199c5071165ea0ea8787aa0212cf26c7314339042c598654faa71
SHA512984faed767e8521fdd858906e3e1066997ec046ea69c01d7546141f1c278b98c9576ff7fa9c7056741d7ac237b40c4e5e86be82e8495bbe6b9a8a3f4f52227fe
-
Filesize
6KB
MD56defa23b5e1c2c984557537b623ce552
SHA1dc4fc74a04c4f0933f887f5c5bc63f4eea199aaa
SHA25645ac5ad397826ffc940c507d6c4c1a9e175f1da3c12693a4175d726c4d08e1d3
SHA512abb3b66135fa85471712b29865f4dd3d8f91a57a043e59390c92b7c6f86f49e6f7abf7661cb701b67e281d3a65807561464b79f3536a93aa59a446bb1e20e507
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50adf5b184a59340c8e546cbd1dd1231f
SHA158247a5e146b3f131365b62351cacd83c98d14ed
SHA2561d9f4738d507800743941a1f7e270f262c1b342daa6ec70438d4eeda058ca193
SHA512cecf5d732ff3c222fd2eb6c359b369a0ab4974f6de7a10e713b4fe499e6643afdaf71a61ba9b15517de11a3c9a7a61085efe68c2556ddeedf963f83de5da3ff1