Overview
overview
8Static
static
3IDM/!)ж.bat
windows7-x64
8IDM/!)ж.bat
windows10-2004-x64
8IDM/!)̻.bat
windows7-x64
8IDM/!)̻.bat
windows10-2004-x64
8background.js
windows7-x64
1background.js
windows10-2004-x64
1captured.html
windows7-x64
1captured.html
windows10-2004-x64
1captured.js
windows7-x64
1captured.js
windows10-2004-x64
1content.js
windows7-x64
1content.js
windows10-2004-x64
1document.js
windows7-x64
1document.js
windows10-2004-x64
1welcome.html
windows7-x64
1welcome.html
windows10-2004-x64
1welcome.js
windows7-x64
1welcome.js
windows10-2004-x64
1IDM/IDMFType64.dll
windows7-x64
1IDM/IDMFType64.dll
windows10-2004-x64
1background.js
windows7-x64
1background.js
windows10-2004-x64
1captured.html
windows7-x64
1captured.html
windows10-2004-x64
1captured.js
windows7-x64
1captured.js
windows10-2004-x64
1content.js
windows7-x64
1content.js
windows10-2004-x64
1document.js
windows7-x64
1document.js
windows10-2004-x64
1welcome.html
windows7-x64
1welcome.html
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
IDM/!)ж.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
IDM/!)ж.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
IDM/!)̻.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
IDM/!)̻.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
background.js
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
background.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
captured.html
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
captured.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
captured.js
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
captured.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
content.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
content.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
document.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
document.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
welcome.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
welcome.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
welcome.js
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
welcome.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
IDM/IDMFType64.dll
Resource
win7-20240319-en
Behavioral task
behavioral20
Sample
IDM/IDMFType64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
background.js
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
background.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
captured.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
captured.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
captured.js
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
captured.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
content.js
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
content.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
document.js
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
document.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
welcome.html
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
welcome.html
Resource
win10v2004-20240226-en
General
-
Target
captured.html
-
Size
1KB
-
MD5
461955b3522967a8f6c0b81f064092e6
-
SHA1
1b24ba6a971800488cffc17b980181673196455a
-
SHA256
e040a22746d1d93bcc239e68885ac4475f9e18c5ad7edfc3501c2dabf1826920
-
SHA512
84221d2e55cfe02398e239a7d55b49e6dc22a0c206e3a3b817fdc621e3dabfd732c299ab9fae1d5f7d6f4f46a855ccb44e319f1040824c2b797e17f526c866da
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 8 msedge.exe 8 msedge.exe 2900 identity_helper.exe 2900 identity_helper.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 2680 8 msedge.exe 89 PID 8 wrote to memory of 2680 8 msedge.exe 89 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 744 8 msedge.exe 90 PID 8 wrote to memory of 5012 8 msedge.exe 91 PID 8 wrote to memory of 5012 8 msedge.exe 91 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92 PID 8 wrote to memory of 3968 8 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\captured.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf96f46f8,0x7ffaf96f4708,0x7ffaf96f47182⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3421569469714947074,12742775266301109318,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
6KB
MD568a053dd8e603b7e0ae8db2641154b40
SHA1b77e72a0834badbe507eca2584a7d0dff6eac362
SHA256c649b6931708eed1e0e42ad16084ee4ce0557dc3efa7f9718ae3b75c2f5e49d2
SHA512e21cf74be9dc1a95bf35f03d459755ccaa0661bdc1cb73c40ee76b2cef9f3da7c9c1a37d083f8c5808cc1a7c6d2262b19f60309004f4df8e527e66beb6bb10e4
-
Filesize
6KB
MD59e090b1762279f40755f19182df4f3d2
SHA12262f616afc8ba081316ace6960f19494fc930d0
SHA256724f2b7f57ab6d6444393409c10e6f39e78348d65994ec6e82bdf9154eeb759d
SHA512f187ef51727a86392befeaa01fa3d8497db24e20619f9282b8c7651420ce0ad58035364681f9983b5ecb5306811628dc91d955c0d8c8d931f42386197a93d8c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55afbf8cba1f85593d3e8aea54b2dd70a
SHA1921c27fc6774836eb5194d25af64a844a459181e
SHA2569c73a1e1aa1f56aaea209e50da29d33887b4b914508ed3e63bee088d573511a4
SHA5121e0229ba274a8f867b93105767eea8b89ccddfd4cdde0677a1ce4f77cfaa39c4a3cee6b4e1e6831fb5e2426d69e86af9f0a4e4a9ba13de06275c9d33ff71e0ef