Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
dfb6daa7d0bf55712b8d6ee13b5a70af.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dfb6daa7d0bf55712b8d6ee13b5a70af.html
Resource
win10v2004-20240226-en
General
-
Target
dfb6daa7d0bf55712b8d6ee13b5a70af.html
-
Size
55KB
-
MD5
dfb6daa7d0bf55712b8d6ee13b5a70af
-
SHA1
dec4c1ae1293b8d4126b3610e27e4615613edb73
-
SHA256
0535577b6222ae3fbf40329314cffd523a050d1c857fe0a6405d4e78d791d0fa
-
SHA512
a9f86cf8436978246b59bcc52c5d7e706ecb9804cfba43cca6ef5d6da994fb0ae0fc35a539496652138a6df8ce309225854bb1191aa3487b2b6807b232461524
-
SSDEEP
1536:/yTupBl7F/qUnPbdBfagI/GA/bfuCRiaALj:/pBlBFbd+/bfuCRQj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 1688 msedge.exe 1688 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3520 1688 msedge.exe 88 PID 1688 wrote to memory of 3520 1688 msedge.exe 88 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 2308 1688 msedge.exe 89 PID 1688 wrote to memory of 4772 1688 msedge.exe 90 PID 1688 wrote to memory of 4772 1688 msedge.exe 90 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91 PID 1688 wrote to memory of 3996 1688 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dfb6daa7d0bf55712b8d6ee13b5a70af.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaee9146f8,0x7ffaee914708,0x7ffaee9147182⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15907719613843047051,2139168012517351369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
20KB
MD52241efaf8a5d6561e64fa7e97dd66e78
SHA17b1f677f739c119f878cf3a31e02c2af7504bb54
SHA256e1e55887f81363ce752f53f8c92a155fe041292b48148134018a0476cfd8f204
SHA51278137eb3866b771554b70ce90df1354cba5990602018ca677fef64959188fb40a4c23edcb8faac9367db57d0a30cea61a52cabeec10114a1321e9488a8543178
-
Filesize
44KB
MD526a55dcc6250e84042b29959f5e50334
SHA1fc02ef852f17b4f9ff54e7c677145809cc205759
SHA256d374d2ac88b65c3b78fdb96d2c6398493dbee61549b39c3880a584d2bb1be825
SHA51233db6af42c615f586b412bbfbe0b92126f91c4b80f9259ef94aeea103498cb53396e28c0e9b1c10bde0802915f8c8877c596f07a5c5c61f4a90cb1df06f67c4b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD590e0e17586cfd6808b3101664e713e9b
SHA1f561e2e07f6085db211f3e63caa94df21196e491
SHA2568be5aeff1b12041677a915ba62ad54b4c97de39da13b15db52580d92bfed78f9
SHA512499715190909015d46d090f2548d210b2abc45e550f556fdb02c56989767c22f53dd6546626df672792c594b5aff3649e64fb28c637b8f3382c5ca311b0e6ee7
-
Filesize
1KB
MD5960f712d5b59a441d3821e6aa627e6e1
SHA17dcf80e41cdf1844c6773e68e5d1ca2d78f7e778
SHA256a82b819313d62efe8778f295ccf746e7b0bbeda9220216b9a3c3ca082067342b
SHA512008f044688e8a359dd198364e833df1c06e814d4349bc28af624926021ad5e7a1a91c10eadbfc48477845874eb5b8d371c71f9c9463b1e4d41bc9208a965d226
-
Filesize
1KB
MD518c86ea6da02b75121dee995b2090486
SHA145cd25248afa1a7bde2deabd2714244a628a3d25
SHA2560e39aab8dad9be3e83c553eba0154ca8173fefb1983de7f534ea1cac79788bd7
SHA5128afe78636f9bcb8d3c2c05d21a4be65fe48450e48b80c41fcd37c009b8aba848f0d59cbf056e96132732334ad639b3bc52a5819d98f28f8fb2662ba826cb801a
-
Filesize
6KB
MD5e3bab23ec20ac1cdb676fe7501530b6e
SHA1b25f1215885540191c5d5279434da0f26f009f01
SHA256782a3a5e9256723129bc95da19d9254f35674a19b6a6c1f4da628e0705ae0db0
SHA5128c609c33d5d65d71a403e3cde5b3709addd62edcddb114e9861b0685e9877a8e9c133b0b76b0d3d1097f61b1146d0060a3185f57c50459be12819bffb638bcfe
-
Filesize
6KB
MD5e9253a02576cf8140cb1580dade4cfd1
SHA109f13dac8c4813f99c2757de8cda9e7e9627e2e6
SHA256859e8fb25cb2c6458459042040020312824fbaab031be9d568ce71f614720e00
SHA5123c0a7e75f434417a78ff32404225a64c4da3d8030ce9ee25a6fb574e96d27b1b1afd4b38e42f0fcb0c288de4927fdee8037885fa48df98bce9286cda62f09b90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e596ed80e36f17c49fbe974c45937778
SHA1e60d2b276400990b6ec768a14035d41f75d7b332
SHA25618c34fa57a58aaa846a1b008ba44547e021fe1e4d6773170787a5995c8dfdf09
SHA512056ac170264e06fceadefd9038f5dbe9e75449673c53cafdef99502b488d0cb6ff2c0c1a24585bdc6910afd9f81080a04ddb92b6444cf5be485bde9e507d5fce