Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
lists.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
lists.html
Resource
win10v2004-20240226-en
General
-
Target
lists.html
-
Size
12KB
-
MD5
1de84ad40b3b4b8f0e364b5861b35596
-
SHA1
8c97ea8ce6bcef52261ecc24cd77f0b7391cd2ad
-
SHA256
717f97aa518edbb6e9d46a4cf7362843248daf7d8cec0420d7d055f7f8ddf8f2
-
SHA512
3dafbb9abd180fc7e1a33c05489a15423aa21f0680882a0cc1aa1590c161dcf083229876570de928468d7c2e130135d83ed8830d2edcea8d4c889e107892eeea
-
SSDEEP
384:kul7ErQ1KL0X57tBqsQ6rlwEOzMvAU/aT6CYFhB7zJ:rl7MQ1KuVQYFhxJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 4280 msedge.exe 4280 msedge.exe 3340 identity_helper.exe 3340 identity_helper.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4348 4280 msedge.exe 86 PID 4280 wrote to memory of 4348 4280 msedge.exe 86 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 988 4280 msedge.exe 87 PID 4280 wrote to memory of 3956 4280 msedge.exe 88 PID 4280 wrote to memory of 3956 4280 msedge.exe 88 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89 PID 4280 wrote to memory of 4856 4280 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\lists.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa06b346f8,0x7ffa06b34708,0x7ffa06b347182⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15827183441939666761,2068049179420686834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
6KB
MD5f261c4eca3916547a70a174e92fad7d6
SHA124a982890c1c1429c296ae89efd16a72a2f1131e
SHA256856f49e81e66bedf04ebde6fd99559cbb73f8fd694a45c41f08f8969d5d719f6
SHA5121dadee4b8f51affaf344e9873e3d2dc37ab8253157e557b24fe1b424a008732748dcdece7366b194952b92a60079f8c981d8ff8bff8d3819b1a70dda0f307ec2
-
Filesize
6KB
MD58f3a5e93e1eb7f0ef890f995c10ce997
SHA10027aca2ec8e8fccca85381c2618744ea4283766
SHA25661e9d2ebca08f7467ddc94255dd7eb85a8c5eeadff4fb818c95d12349e5bed78
SHA5120184239d6e36cceb3ebaa1ba27f8e2e7fef9e0a04e19420da6538a477e4d01e87da47c2bf36bf7556e61e38590a4ecab97792c071bac9903df5114714fb59522
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b07ca08dcbfdc560cd539fc7d21d642c
SHA1db57ea2d8dcd74566ed4007f12dc6b6599c55319
SHA25684eb9fa3ad9acb360f6e2f036acb125428f951d1c69fab7bccdaa601a9584439
SHA512df3fd00f1cbbbed307e08c2c48d0fabcb0a1fac0d121392fe24f74df89237e74682837453f483d46dc84cf723933f9f607772a7d0c60918019eabc4bb64c8dde