Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240226-en
General
-
Target
sample.html
-
Size
30KB
-
MD5
7f9a8419c2ec10ff1f00aeacd57d6e36
-
SHA1
13d5713be822b6f6ce3e0693fd64048c893bef70
-
SHA256
7aeade2480ecfdcdab94a7415bc5aa8ba4473c6923adf411240f80b1136727ad
-
SHA512
15a7172c7aba695478bb6cbcf424caab6c85f02b1639a2a4eeb92e177bd33e1e0ba277ea48db2c3539a06406a13004a3bf0f15e4a26c9371bae942c0d200ea11
-
SSDEEP
384:SIUFpv1T4Y8Cb6FezwzkYeznOubOQoArYVPYs/1RFCvMotdvu3hl:SR914YuezwzkYeznFNoArSP4M+dvahl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 3224 msedge.exe 3224 msedge.exe 2460 identity_helper.exe 2460 identity_helper.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 6120 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1276 3224 msedge.exe 87 PID 3224 wrote to memory of 1276 3224 msedge.exe 87 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2140 3224 msedge.exe 88 PID 3224 wrote to memory of 2092 3224 msedge.exe 89 PID 3224 wrote to memory of 2092 3224 msedge.exe 89 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90 PID 3224 wrote to memory of 1044 3224 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9ca746f8,0x7ffe9ca74708,0x7ffe9ca747182⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12028649044759053878,1236692338248980116,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1248
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:228
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
522B
MD5e36f28bc14ed222a8009ed0f5e5d082a
SHA1ae6dc1f0da431a7c2a2e4e9e3c739c954a676a70
SHA2560f1a858ffc04b3127ef49672749dbc088691aca19c809bbb6bb18bcbcb7b1a82
SHA5122d60db780a87a26da67b75b6f43926b6d7e129b1dc62e7c3a6dced7171698ebba35354e65deeb1d7274125d070d561fa735283b615cbeac1a85e46870da0e7c8
-
Filesize
6KB
MD578721b07a8a0501989927665d96c6556
SHA140f15858c4ce5b4717c54071c51e30754b8f500e
SHA2565f4eaa425e5d3ae1cd8f6a8f29e1001e8cc7701cadec02e702ea5cb252f49e25
SHA512e3cebc554beb1da81d5a65092a900183d02622cd04ff7b15f2f98af573c4825eeef41a36dcbcb5e0d0ead2fac5d66847605acfd28aa17282dd99c3ec31338594
-
Filesize
6KB
MD5aed8baf17f6a2a5264c3186740c99021
SHA1f45ab11344e921926c9d8d75d7989b942cf1b283
SHA2568ee71228b41c099990ac5e77b07fbfd18179bac88963572d8c2282a1c9b3882f
SHA5127f1579f03cbae05c98cc8a56dd6752ca9f049cacb37ddfcbdb7e9b2e587cb9d57982559229b7d93dde23e4ff38d3472d6069757c4f1df5e3890cc77c105e46e7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53625f65bb96613dd78c94a6e03b61f16
SHA1b17d0cac5da6a0b467c956884e050d094718ef7c
SHA256e930b0a2fc33a18bdfba3e957f704bb33b1a2cfbb793cef46eeddfed0751b65b
SHA5125f4b7ed4a15778a23c4b4e1e893614b115e42f033b6f92d0bd3b73a1ec46eed7649102504a42e8c18a3fdf49db0ba23994117cbdb4e51f9913522a6de389c737