Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
e1172b94d1a364c8a5345c71070d095d.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e1172b94d1a364c8a5345c71070d095d.html
Resource
win10v2004-20240226-en
General
-
Target
e1172b94d1a364c8a5345c71070d095d.html
-
Size
256KB
-
MD5
e1172b94d1a364c8a5345c71070d095d
-
SHA1
9ccfe70769e11096023731ff8fddfa85244bd6c3
-
SHA256
fbbd1ff361c3497359534dd2df39394ba358d2005008a20fd95d418b97e5f02b
-
SHA512
03cd680876e0c74af2055eaf1d519aef48b563218e78ba739d1e87ccf6768d545c3af5caae1c4d9c55678c5137579f313dfc17971f8a160b4439cb8fb9de6ac0
-
SSDEEP
3072:cl45naA60vaG37B8XUSTQpuV2h6nBEsb8Q2QJobBR:cHA6EaGkq6BKR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5252 msedge.exe 5252 msedge.exe 5900 msedge.exe 5900 msedge.exe 2848 identity_helper.exe 2848 identity_helper.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe 5900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5900 wrote to memory of 3672 5900 msedge.exe 88 PID 5900 wrote to memory of 3672 5900 msedge.exe 88 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 2384 5900 msedge.exe 89 PID 5900 wrote to memory of 5252 5900 msedge.exe 90 PID 5900 wrote to memory of 5252 5900 msedge.exe 90 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91 PID 5900 wrote to memory of 4796 5900 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e1172b94d1a364c8a5345c71070d095d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe08dc46f8,0x7ffe08dc4708,0x7ffe08dc47182⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16629342807764641228,14364923365480071301,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
1KB
MD52ffcc6d0f18eda510f7a9343a801ecb5
SHA1d9140f5099f6129d000fc96275ad447037a14c78
SHA2564afd68a58cbf8721c8cc86e333be9dc6551ae5480e32d969d99a36564b96eddc
SHA51250faf66430ae61f35d1c23adc700b4304ffec8b42be04d04f128308b5760d6cd46fb8a88bc3a38471d169408f183a14349e5fbc336c9141a99bf7682795c7bc2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD56502bbbfef438764d390c8bafb344484
SHA13ee2ec7e87a6dd8780c93f516f6d414c7d2f8566
SHA256fa61f7a097b7340d910be9656b1a365657aa1f3dd868c297d7058cd5ab205a35
SHA5127aed45da4571e39ba41d2718a5bb0eced04492784530220e51399359a37cc902709634a0a5f3466beaeefa4b0dd84b0f2e7ed9e455c874093328480f697c4b31
-
Filesize
6KB
MD57e19251a6be3f290d532bd4e764acee4
SHA17382d4faf49179e91fd2e6791d915a07cc0ab70a
SHA2565e6a7d7731688aa94e011bc2a197516a4800941084ba2667c75e98448960324a
SHA512f527f0a7310796cd1a1ff0f3ff8f7972768a0b78a447eaa49ea50a8942e55ee05519f7276d0cd078709412b8ff535a551f12a4780eb5242bf6caaa07b51dc6eb
-
Filesize
6KB
MD56a70f367b8689cef7e45642d46ae2813
SHA1563e51b5db316a5a43fa64f4cb1d4c909f3b4ca1
SHA2562007099939147598949d8b937d10ca9fc63b9b95a6305d4e9548b7ffa0512981
SHA5124204d899997d86d26d7de4fb5e4a8a43be1ce34a2e4db82fef361ee2ee729da607a83147bf7d68ea20c1201b2e18bca9738a548fd403798ae022928f2bcf4f5c
-
Filesize
6KB
MD5532180ad35dc17c3c17e2c51e44b20fc
SHA18a3bc3afc36875642e7b060d17eafed79afb95c2
SHA256ec2437076dfb42844233da9d43a014ec23a492430bca58050cc71a100c028bca
SHA5129c82f9747869d3791daf7290e7998c930b45dfb7f49cfd94ead4a14ace1d342f938817fc88334b587d23221297947851cd160be1181ecbeff4b03bea356cdf65
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57300532cc75e88f068e1dfad97bf9a31
SHA18727e236f1b4a75d1b08cdf80897b7a39993c987
SHA25605564a1aad15fecf7f58b4e2d55e3366be7c3ae65903827e6c1a0f585f1e3fca
SHA512a6527cc88ad5e24c4459880dafad600c896a28e585185c63840d3e1e95f1a76a86b8414b6376ba6297552ec721c1ec366468501b3b6a04a4957dda19a175174b