Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
de0110cb6843a1a5b0a48c75c3b8a741.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de0110cb6843a1a5b0a48c75c3b8a741.html
Resource
win10v2004-20240226-en
General
-
Target
de0110cb6843a1a5b0a48c75c3b8a741.html
-
Size
852B
-
MD5
de0110cb6843a1a5b0a48c75c3b8a741
-
SHA1
52b66ccc34c6a9ee59b42d71a543f6e7b9d87e93
-
SHA256
599d8a7b7d1f16551ab34d0c170fe2e53209f3fd2b8502c2293a85d10ceb6b79
-
SHA512
e25cf5aa7a3b17fb72af697781f0089066bb6ab2f5c087a2a3d11339c59c027084f9ff48bcb4203ab7e3cf7032ccd64d23b5a3b610eccb276ae5577d83873d32
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 3632 msedge.exe 3632 msedge.exe 1968 identity_helper.exe 1968 identity_helper.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe 5412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4352 3632 msedge.exe 89 PID 3632 wrote to memory of 4352 3632 msedge.exe 89 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 448 3632 msedge.exe 90 PID 3632 wrote to memory of 4340 3632 msedge.exe 91 PID 3632 wrote to memory of 4340 3632 msedge.exe 91 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92 PID 3632 wrote to memory of 1784 3632 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de0110cb6843a1a5b0a48c75c3b8a741.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb62046f8,0x7ffcb6204708,0x7ffcb62047182⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17417052607676768987,5626005206557683984,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
189B
MD5397f53f29a17baee00697ca31a738b65
SHA1bc300bb2b7797ab6c948a77db2cefad1361d0f7a
SHA2560dba79eb79d62dbf47c0a71d0802e2f473818740fd5869140da4dbfa54582948
SHA512b2857d010ac2c15a16838ff92c50042ebf687e293f05bef559769768fc214032dafa75d0ecb41554122b647294999cbc41cfa3c8e3bf9f5bf8d02a32fc057817
-
Filesize
189B
MD54e5358a2c6de92431acb4798a23ef492
SHA1889ed02171f7e1c06d062073d67c9b8267e12f3c
SHA256b65331a600b2b21865b77cdff50bfc8550ef87008413ef3d99a9a1084b5ce38c
SHA51230485b8f158127294fd53afed26a245aef98c49e2efdcc1a32fbce60d250fe4a78822005a18bafbced0b9dec34e7ef3c82a0b28baf0f8a1523337827984a95e8
-
Filesize
6KB
MD5d7fb84af69e9cfa7a70d3084ec3a2cac
SHA17bd9d5841727d7e8a748d61e552e545b88bf8985
SHA25647410624e43b8dc36dd00bcbda1bf4fa10c7d1c70d5bab5df17d3be069be99d0
SHA512b6118b8b649b6da9215f751abe05835980da2595c2d6a316e8a8fd51cbb1a1a84fc12cd914a59cf6e480fd825e22822d8479a2703ca7a129858a7f096b18c30c
-
Filesize
6KB
MD5d4b1f8a8b687246c5eb250b4b1fdf79c
SHA1a99beec6d482add71cc4c235d42c08a38ee479b8
SHA256cf162fa5e019092da012f0f36578b57f863a2777669dc321aecaf091d82a4f6e
SHA51280da1f3e08b1b9388f3fb6c2d858cc94564b163397e4c0f05318ee2368fb2a799bc450e1717a024674346fa77fee8e89d7dfaed13fc520e1e91583d48da461b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b70b5a77d5deca18358726eb95198240
SHA1717005de86a42b3ec3b9269b1c4911d9ab26e29d
SHA256736681c059080bcb934e022a4715febf82dfdf2faa0f8233ca1129a319eeac39
SHA512f2c05268d195fa662199d9b33c4f15410bed224836ab4599992e6c6ec63d26941a13f234d8a4087d324fef8ee0d35082f6d381b860274fdef9905a1b6dedb2d6