Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
94a2b39e00ff03061093cce7ead1aab677c939400428a37a00bf89333655ba82.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94a2b39e00ff03061093cce7ead1aab677c939400428a37a00bf89333655ba82.html
Resource
win10v2004-20240226-en
General
-
Target
94a2b39e00ff03061093cce7ead1aab677c939400428a37a00bf89333655ba82.html
-
Size
30KB
-
MD5
0ede5c6f925b4ef08446c063c4805ff9
-
SHA1
0ce1bc275db0b5a04076f3e7762898b4ad90fa9a
-
SHA256
94a2b39e00ff03061093cce7ead1aab677c939400428a37a00bf89333655ba82
-
SHA512
887bfb827d4b6f05fbad703dc5d03f1c769f08a9110a32590039560fa83cacdfbe27ee6ea8671796713ccd32b73ba9163913136b5e394f173bd92b76ad592e54
-
SSDEEP
768:QhFTL5vdfN/cXSx6ndD1Nv5l0aA5bUFwT3UdOYBanCnJPApK13ls:gThd5stDzvCfQOYBaCJP73ls
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 1536 msedge.exe 1536 msedge.exe 3616 msedge.exe 3616 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1536 wrote to memory of 4756 1536 msedge.exe 85 PID 1536 wrote to memory of 4756 1536 msedge.exe 85 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 1916 1536 msedge.exe 86 PID 1536 wrote to memory of 3288 1536 msedge.exe 87 PID 1536 wrote to memory of 3288 1536 msedge.exe 87 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88 PID 1536 wrote to memory of 4204 1536 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\94a2b39e00ff03061093cce7ead1aab677c939400428a37a00bf89333655ba82.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb32c46f8,0x7fffb32c4708,0x7fffb32c47182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4696 /prefetch:82⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,7432322511077031152,3598516247155851945,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
Filesize
178B
MD5d37f939b75bfb0193634692794b2ecb6
SHA14f392548d18acebe54b571e3a3daea2ba46bc629
SHA256945a8fbb7c5a0093d2c0c0e9c24c16a3b88d6c369ed7ebd95d6dc97377d9a84a
SHA5127030738aa64c5c28a85630a1919d1e0233226d1b0df0392b73ba6038f3ee8d7f7c3252840239664a20f0c026cb390e1c766d75843ad08f42423f4c8e2b167ba6
-
Filesize
6KB
MD55944fdf7d6c1760a1da244dcf99bba66
SHA1563e1753c2f693899e73bc6fa3c58702d789d2dd
SHA256987f06f56d60f3c7cae54491e4fd5d4a42b4858b4c5d6efbceeb0a37804b50ae
SHA512bd922392eb983d8c2168b1aba9b112d9bc3b0e1725cf45dd916fd98c73fbf2020f8c2971d03a7705a00a54b9d21fce2ae6eae7b5eef1158018b72a1838d9418e
-
Filesize
6KB
MD54933886b83a1695b313802c60e863ed4
SHA19a350cad55ef0e6f5015ec1e5f4c90461653b3ea
SHA256234357858fc07c6a1c1dd944c06d1cb5b1c8bed3328c72e88c994c67070bd111
SHA51215e34aad1d7f0672befa9a95e810b897c462b9909d3474929202eee1cd42a5eb73b621d9d3cc13c73a9ed611909df8976c5afd3da21b27ac21aee8ad31a93fbf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD505091eb9b31dbcbf1b3ec73d103b5d15
SHA1cb7a8ad58509d3b22be96950ae769c012572aafa
SHA25603c20e61222d49fb15ccee16c65ee284a7553e4eab8b972421f67ecabd7f2fba
SHA512916067d75ea6b66d503f0e9aaa859dc87f6c977be09e61ac0e1193433ffcf7d391ebfdab502424117c01157974d1ad6641c63e88d4b8d70a7a9bd98f2218e364