Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
e03041ab046e00aef3442f1cd24ce467.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e03041ab046e00aef3442f1cd24ce467.html
Resource
win10v2004-20240226-en
General
-
Target
e03041ab046e00aef3442f1cd24ce467.html
-
Size
46KB
-
MD5
e03041ab046e00aef3442f1cd24ce467
-
SHA1
a33dca1713b641ad577e9a6aab9a3ff0d03351dd
-
SHA256
a115138d451659b3df396fa719e60ba44509026fde245c8ca6499cb1376f4cb1
-
SHA512
cb34f979aee4474ccfacaa0c175f6c7fd865e502e9a303d6222d8fbe877383d4eb81a137bac32679d72afecc1b45474c85d393e31b5f27d1ff31923f83dae2d1
-
SSDEEP
384:F8fVl4a9axyTxeARGwwBhvBLKycExjtOyCgYj41GdDJ/oaxyTxb6aEuw:F8fVl4aH9RGdhdcEjt+wGdDJ/CV6aEx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 4240 msedge.exe 4240 msedge.exe 1184 identity_helper.exe 1184 identity_helper.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 3460 4240 msedge.exe 86 PID 4240 wrote to memory of 3460 4240 msedge.exe 86 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 4736 4240 msedge.exe 90 PID 4240 wrote to memory of 3980 4240 msedge.exe 91 PID 4240 wrote to memory of 3980 4240 msedge.exe 91 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92 PID 4240 wrote to memory of 1436 4240 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e03041ab046e00aef3442f1cd24ce467.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdbdd46f8,0x7ffbdbdd4708,0x7ffbdbdd47182⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2984 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1852 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13726372544337407707,9916248390325416166,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5add8640c0ed48b1325b450fedb0d79d0
SHA1ac4dbcd186c82548349195b743011db0ec89b357
SHA25679de3113fc9807132f1c51c3f4a482cb7afc5b77462f0a242594a1b904a729b5
SHA512363bff6a68cfa3e888968105d4895dda9eed24b7f4b7c2553c0dbb245c835f0e754219e122f86331ce23af98f2a9a7f5bba7cb9bcb39dbec3429c5f2a65f712f
-
Filesize
978B
MD5b413302f614107074faafc64e704abc0
SHA14d57570c85ee29b9744e10edf6fc45f9f9eefb20
SHA256b8f8f0125890274cd4e4fd705c20776eb726d3683f503efb7b16d8b02cf87a59
SHA51265a81cb4b42a2ea7426d3056c5e8f16e26a774513eba970f161ade7f379c2f8c1854ae0447d739aea209e2d95768b0bf9d3c9f86ab3902139b185e5f73e6ab78
-
Filesize
6KB
MD51c644f0c3bf4c8d3c3a0139e6b69d14a
SHA106652d779cb49742f4fe46664f22690c93768963
SHA25602004c44a64a8c54af9a1ef08ac74147c5503b5e9eec5072864015035d29bf4f
SHA512926b78c1a7d3966849776903ff60b1ed50637312a1c931d8cdaddf3c631259fcceebac2a5ef77923cae7ab9e0c2c5e6dfd6f7d6cbb66bcb8e3c371ddbf18a5de
-
Filesize
6KB
MD5fbdb007989de85fa1d5aa7a53e832143
SHA1a9df556176e4dded5bf4fd99cd858dcfa9fbecee
SHA256d768bd315c73a0ac78c947f97aef041a8e89ac0a854909cfaa6d18f5853fc0f5
SHA512c1858fe3195f996c4ec88905bb379aa57c9fc06c863051d777c16ed067cd11431db2bb078f2a8e3db191d46bf97b19bc11fc5a75329683a07f6cefe31c364d0b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dbd106bc546671ff3d3598778fbf0c9f
SHA1857533a9b4e9c3d36d70cf8461f08d53ade58253
SHA256556d7e7d900644f6716775aa14eef7043fcb3e6b59f31f11e7e1715612a27e78
SHA5120482f72b87fd929232328fa843ab107885a15b85767f4daf883b8775eac95747e63ae50053061431744eda30d2bd14540891214c5f56b510985233c800458fff