Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
de19719862cadf9bb316107a16f21669.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de19719862cadf9bb316107a16f21669.html
Resource
win10v2004-20231215-en
General
-
Target
de19719862cadf9bb316107a16f21669.html
-
Size
842B
-
MD5
de19719862cadf9bb316107a16f21669
-
SHA1
424543b4aaa532bc2452f051e1762a16b97c6001
-
SHA256
5b28d4fa585e4d07cbecd5b7cb52ec6cc33f673b0e785f232faf9d5d74191fe1
-
SHA512
64dc6ef12cdc9d4829c37dddfd495ca361325d639f4160e57c8a69cbbdd1bd33061972efa1f94e81d98d831d0d59fc8d22f78a5be55f17e7fae784264d0e8446
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 4888 msedge.exe 4888 msedge.exe 4552 identity_helper.exe 4552 identity_helper.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4156 4888 msedge.exe 85 PID 4888 wrote to memory of 4156 4888 msedge.exe 85 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 2388 4888 msedge.exe 86 PID 4888 wrote to memory of 3908 4888 msedge.exe 87 PID 4888 wrote to memory of 3908 4888 msedge.exe 87 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88 PID 4888 wrote to memory of 3632 4888 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de19719862cadf9bb316107a16f21669.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef72146f8,0x7ffef7214708,0x7ffef72147182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8279693824803812369,10894890202996840328,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0a9ddbda-46b1-42e3-9683-8398b4324ad3.tmp
Filesize24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
189B
MD5397f53f29a17baee00697ca31a738b65
SHA1bc300bb2b7797ab6c948a77db2cefad1361d0f7a
SHA2560dba79eb79d62dbf47c0a71d0802e2f473818740fd5869140da4dbfa54582948
SHA512b2857d010ac2c15a16838ff92c50042ebf687e293f05bef559769768fc214032dafa75d0ecb41554122b647294999cbc41cfa3c8e3bf9f5bf8d02a32fc057817
-
Filesize
5KB
MD57c368caf35e49919c5d8299f3d395d17
SHA1997c20bc944c18ccc059bfa6ab08f20887b5deef
SHA2563eb0d44fff55859926b2e14b2059cbe5d9378d13306d84916d87945fca2989b0
SHA512aba5836ee5d19ec69d6e779259f30886c66850c2fbadec9c052aade96e9f97486bd8c8dda1a037e885b6508cd3c055249aa02d827edb1eff942f669d2e696b79
-
Filesize
5KB
MD5ef0d020eb4df468ec7671d244eb9879a
SHA114a341b57596cdaa61b5f1256ea71da70996766a
SHA25660daaba9048ff3ef5ba3182448c8343679dc7f36f9d42110bd1165da57d418f8
SHA512fa678d2d26a74a2032ed3052a01f10201233e16dde040fadb65adf2f7144de78b22635874aca1f8c6d16eddc3be1398d2e59887460d573eac0843fdbd8558eeb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53c7b24821693c902778f06dfad51b018
SHA1d836600b29a8bdece2d73f0c446b46596ed6b482
SHA256c31c505f7dde0f6095cbe32269e562bbbf5a9aef471291628f0417dfe0710708
SHA5128563e8b07e0d2086a2f068f27dc1b5b0215ce02ea42cca7de3267b9767d055ea0ee43f951245dcbca731fbd14ece50ba38a05708f07dbfb4ad47766f8cb824f0