Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 18:12
Static task
static1
Behavioral task
behavioral1
Sample
dfc9ead1ba06433b2aa0f908613dc10c.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dfc9ead1ba06433b2aa0f908613dc10c.html
Resource
win10v2004-20240226-en
General
-
Target
dfc9ead1ba06433b2aa0f908613dc10c.html
-
Size
33KB
-
MD5
dfc9ead1ba06433b2aa0f908613dc10c
-
SHA1
f0bdf6077507d2285d1f00525291aab7cf20a01f
-
SHA256
74e7578bfb38abaf2a54588eaac19e92e33fdd5a129aef2cee5a2cbdf800bdf5
-
SHA512
0c3bcddca0610db833d7372f319d4b74098f974bd75885d1e32b3907c8efbcd2f25ed5a382a5d5fbb8a4fdaf3546d49baf81f281dada67e03caa89eb74b24582
-
SSDEEP
384:rj6On0vifEtDEzjAfuIGDg/uJQBBlwmECi8AtUH:rjn0vifEtDEzjAfuIGDg/uJlX1tUH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 3928 msedge.exe 3928 msedge.exe 1188 identity_helper.exe 1188 identity_helper.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3928 wrote to memory of 2468 3928 msedge.exe 86 PID 3928 wrote to memory of 2468 3928 msedge.exe 86 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 4072 3928 msedge.exe 90 PID 3928 wrote to memory of 2692 3928 msedge.exe 91 PID 3928 wrote to memory of 2692 3928 msedge.exe 91 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92 PID 3928 wrote to memory of 3176 3928 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dfc9ead1ba06433b2aa0f908613dc10c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c99e46f8,0x7ff9c99e4708,0x7ff9c99e47182⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,3231564005409817672,9913789090372053453,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
187B
MD550c2262a2a6bf25c4f880739475a4277
SHA1dcd429feb1d98081628605d153791149184bf7db
SHA256ee7df83c7143c6fd0a571782b6c487cd2e510141423dacac53ebaa0235a29576
SHA512ac328feb491eea97d86ca1946e3a9721868952ca788921b9731fa90069d5c0dbc14efe94d6c8578bccf9c4dc281e296a744fe1a076240c4fbf88d8884e1002e1
-
Filesize
6KB
MD523a1405cad33304b567a5dffde2bfbb5
SHA1ca2e98691281c1beec9959c82579c12d4f3642b5
SHA2569f66db6bfec8eb563f59cea0f7ffaf726dd807a7cf749ebae3ba475fd08e4512
SHA512545d34c25498483baf6f026a5749fddf1a757728d457b434f2ad0ec587fa50d747483a28f5b84556358685c407a1364ecafb5f6d0822a747e51b0b5368cf061f
-
Filesize
6KB
MD5e9b93c6a7cc477fb42b136ed1c97f6c0
SHA1a98d96c0fd2b873375b1c79ff17f634402131e14
SHA256216224beeae7e8e15d1e470fd7f98de48da8a75529287b66dd59e9d13e15868e
SHA5129729e5880af558c524ef13bb4bf8a584428fc2b598451acae6eb88b5ac9aef32cd89c051bd9d01b9991288db930a6107dff7d833764e761abf052d1cee20d81c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD525a3a056c6e70de50025cca293099800
SHA17141022d0c8286c2116a573ebb8f5ae35738bf90
SHA256b24f670a5f1f81af5d12194439f04dfc1c6c10a7b7766c1bc49c1503e5b348b0
SHA512a0dc970d2cedff969ef50423552dc5b02f08aa9fd310c288700c4962461751f6c692c3b84f272de58018cf85fd65e6bce417019bac834c9f1ac3c109b67866a0