Analysis
-
max time kernel
480s -
max time network
484s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
numbergamev3.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
numbergamev3.html
Resource
win10v2004-20240412-en
General
-
Target
numbergamev3.html
-
Size
1KB
-
MD5
7357b3e63daca83ffea7d27a06166158
-
SHA1
26d98c0f0930f76fc738e8d1e8f732f18e13cd21
-
SHA256
6041bed347ff98c08b8135d612725027e378f79fb0995cc5cb89938f835e5e83
-
SHA512
62cee0a4dca7e9dccada7cc0d01e0b8319b2897fdc81f91462fe0f4553426e932c3b5cd8d4e11a539f1535d00f08d82e5be19c0f4be10a04640e6a7d9be856bf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2380 msedge.exe 2380 msedge.exe 4560 identity_helper.exe 4560 identity_helper.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1552 2380 msedge.exe 82 PID 2380 wrote to memory of 1552 2380 msedge.exe 82 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2732 2380 msedge.exe 84 PID 2380 wrote to memory of 2524 2380 msedge.exe 85 PID 2380 wrote to memory of 2524 2380 msedge.exe 85 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86 PID 2380 wrote to memory of 4524 2380 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\numbergamev3.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe189b46f8,0x7ffe189b4708,0x7ffe189b47182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,8662213320200415778,18374165802435519187,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
6KB
MD50588b3eea48e0fe7228eabc9d10e03e5
SHA1a88000645ec153d3688ae3922017038c8a344478
SHA2566bb8cdfbc6a126a47835fd25af73de16860d3d563ebef72eee25bcfaca80c178
SHA512a7f008920f1b632803b9f5cfee04ccdc33d80c212de20919493f2ac730bc531eeddc9f09e62ed12f607effca17f06dbc853ae71226f494434eb5d04d1b041c37
-
Filesize
6KB
MD5041d16552b6d943970abbce9d7d42cd9
SHA183b33820a62e1d934174ced223d8a3319dc265c8
SHA2567dafa6c119ac131abeea2a2d3fc0ecf60906c499095b8934112f336841afcbe4
SHA5120a0f9c48cd86d99d426fb06e408f39ae26f4dfdf0753a8540d32b649415e8bce3e38af016d0e87ab0f1380b38a19c33522269f8476d7e77e8db0effcbc701a70
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ef3f11c5c473a9e84349e84dd432f65e
SHA15f6888103c1a2b644c8dc9a5d8c1624ba0f95510
SHA25660cace28a2fc307215e222327031daaa802465e8e064ede43e019fbbaa65cda0
SHA512964ab372cd3617fdd863a40e64dd2b3660f4d480766fe6ac1f8e37a92eb0a998b23287b6b81f43b2f40338a57d4e149fa73f2e4d0f777efa6b803f4c9f2f0871