Overview
overview
8Static
static
3IDM/!)ж.bat
windows7-x64
8IDM/!)ж.bat
windows10-2004-x64
8IDM/!)̻.bat
windows7-x64
8IDM/!)̻.bat
windows10-2004-x64
8background.js
windows7-x64
1background.js
windows10-2004-x64
1captured.html
windows7-x64
1captured.html
windows10-2004-x64
1captured.js
windows7-x64
1captured.js
windows10-2004-x64
1content.js
windows7-x64
1content.js
windows10-2004-x64
1document.js
windows7-x64
1document.js
windows10-2004-x64
1welcome.html
windows7-x64
1welcome.html
windows10-2004-x64
1welcome.js
windows7-x64
1welcome.js
windows10-2004-x64
1IDM/IDMFType64.dll
windows7-x64
1IDM/IDMFType64.dll
windows10-2004-x64
1background.js
windows7-x64
1background.js
windows10-2004-x64
1captured.html
windows7-x64
1captured.html
windows10-2004-x64
1captured.js
windows7-x64
1captured.js
windows10-2004-x64
1content.js
windows7-x64
1content.js
windows10-2004-x64
1document.js
windows7-x64
1document.js
windows10-2004-x64
1welcome.html
windows7-x64
1welcome.html
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
IDM/!)ж.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
IDM/!)ж.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
IDM/!)̻.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
IDM/!)̻.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
background.js
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
background.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
captured.html
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
captured.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
captured.js
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
captured.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
content.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
content.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
document.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
document.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
welcome.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
welcome.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
welcome.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
welcome.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
IDM/IDMFType64.dll
Resource
win7-20240319-en
Behavioral task
behavioral20
Sample
IDM/IDMFType64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
background.js
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
background.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
captured.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
captured.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
captured.js
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
captured.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
content.js
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
content.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
document.js
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
document.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
welcome.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
welcome.html
Resource
win10v2004-20240226-en
General
-
Target
captured.html
-
Size
1KB
-
MD5
461955b3522967a8f6c0b81f064092e6
-
SHA1
1b24ba6a971800488cffc17b980181673196455a
-
SHA256
e040a22746d1d93bcc239e68885ac4475f9e18c5ad7edfc3501c2dabf1826920
-
SHA512
84221d2e55cfe02398e239a7d55b49e6dc22a0c206e3a3b817fdc621e3dabfd732c299ab9fae1d5f7d6f4f46a855ccb44e319f1040824c2b797e17f526c866da
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 1812 msedge.exe 1812 msedge.exe 3316 identity_helper.exe 3316 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2080 1812 msedge.exe 89 PID 1812 wrote to memory of 2080 1812 msedge.exe 89 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 2648 1812 msedge.exe 90 PID 1812 wrote to memory of 4036 1812 msedge.exe 91 PID 1812 wrote to memory of 4036 1812 msedge.exe 91 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92 PID 1812 wrote to memory of 2212 1812 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\captured.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffb867646f8,0x7ffb86764708,0x7ffb867647182⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2600 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15674985552352139038,13434653919830324651,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
6KB
MD501c99a2530fe4483b34e20b84a1e48e1
SHA14b0ef674aeebd28b9864d2ba269c9ef22d9754db
SHA256bc21729c93372336c52ce6f8a6c4c9d85aa0abd95dd7125b04ff63125dc872a6
SHA512090c013eed8f5638474331c5082abb22a7976111693b48e19f141185035866b4eeca240575b8ee26645808c5fa073986e097e1431aacfb064af253d80dad7040
-
Filesize
6KB
MD5305b33fb5bc46391758c741a87bf1c4f
SHA1528d5670cae8dd5a9f728c1b625dfc3871c1e5d5
SHA2565b69a1ef2214f3f962746d03e7b043e02bf1119c45f678066ec87220105cdc5f
SHA512ad22b1205be4c004390da2b5c83f00fa9505e4009149cce22b4d53ce838bffbfb164499cac887266df865008331c6ea582e297ed3533617608d3c40eff7aa8ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57cfbad058bdeed1423dac0244fca2e02
SHA14242ed9675ec2fb58abe7705eaae24fb3da0afa8
SHA256ad0f1943d9878ed9bcbb8eca97b875d79911f1aae9d393744326851ce0cb729d
SHA5121fc18873ef306e2375e3141245d7a16558aa8195bd1c613b8da2ecb560238a5eda821883abe2ca56ed76055e298521acd2bf0814b237a5209d66fa56bf762a95