Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
attachment-1.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
attachment-1.html
Resource
win10v2004-20240412-en
General
-
Target
attachment-1.html
-
Size
48KB
-
MD5
440ff3f1634e87bc703b4676cbe69803
-
SHA1
d52bf9bed8d8fad53205a969ee0e14ffbbd4869e
-
SHA256
07cb30d6a74100f5b0ae2eb7f8a53542fd43822507a0fed2f5ff351b542ba02d
-
SHA512
a33402b1f60c03028eff8bc1da637ae51001651a7eb343bc43b67e8940d7e89e5fb492a21ac16dab4e31a6dc2c7be59d54fda8ca82e27b7f6b5f12e3fe5ac10d
-
SSDEEP
768:ZcsFvXKeL1ogYdVjJof71CfYGatHbaQSAO:isFv6eBoRbjKDt7aHAO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 1292 msedge.exe 1292 msedge.exe 4036 identity_helper.exe 4036 identity_helper.exe 564 msedge.exe 564 msedge.exe 564 msedge.exe 564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 3812 1292 msedge.exe 85 PID 1292 wrote to memory of 3812 1292 msedge.exe 85 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 2952 1292 msedge.exe 86 PID 1292 wrote to memory of 1712 1292 msedge.exe 87 PID 1292 wrote to memory of 1712 1292 msedge.exe 87 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88 PID 1292 wrote to memory of 1008 1292 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\attachment-1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff8ae5b46f8,0x7ff8ae5b4708,0x7ff8ae5b47182⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8862343845238146780,7921291614148005677,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
19KB
MD5994f86ddb7e33ef6db87e256df2a56d6
SHA1f6858e385c6f2a890bfc3f7c05fee4bc6d7d0876
SHA256e583c4e7780d86998fb50520ff5f5c4c7ca506854844943012413970fa6f07f9
SHA5125bf677e62f4ce5ea5ab54c0a3bcb10c733770e12709cc73ed98fe7d4f8309b81026b2a07aafff67f55ae23b458e3f489ba3ddf4685ca80ec15b33d091527244e
-
Filesize
535B
MD512d5735bdb9a27859dd0243cf80a74bd
SHA1fd6145469586ed294851e80bab20910e38813445
SHA2568cf36dd567326205afc7e80cc7084d097b6ac00a835b9e3e2ce06dc7a499af84
SHA51217c774a8c106eb68010e9ed272804ba6f81cebec656f3156d870ccd64272e6861b47c07b5a052a0f951f111a5ebe47da1460038ea7eae2cfdfa6c7a6c59ac873
-
Filesize
6KB
MD5d3d5c8158ec599e3cd649ce8aa97f2d8
SHA15cc09f99b4a93803e41f41cb2a12c502621d6ffe
SHA2562fee5d3e64b16683256594a1e72de36c61aba4c673550280603b58ee57a76d60
SHA5122c84cb23838538da88bb5b74e27910016623470199035cf199680b105dde2d32083fa7acfa4429dfccf26833d9ed9f0cc4ca523a5def19a309226b74b48a53ea
-
Filesize
6KB
MD571f6e0735b784db0e7c0c7d92811bc3f
SHA1b35eef696ea68868c680527b844e5962d0abd026
SHA256eb1253dffb963132317f3a6cc02ef28d95814bfde256872aa2284941c9bc45f4
SHA512f83506cdbe73245f527851cba6f0098fafff4ae901b14996526c37941fd627b7e8bb805d562ef627857725e1dac91eeb41c2d5c6af1af28fcee14740f7217b49
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d39567a82c01fc63daab8a28210ffab8
SHA12975119a766a05d33f9f7d4d376f2b61d5657663
SHA256d4cc71d53929fa4a061bada62bcffd12831993a5abcce385c4547a5046dee653
SHA512c62a4b5a6bab06ae5ac0596e8bcdf1dad11515a04fcaf5152550260e772e5feebb0861043871b89df045d135efcce6ab46a720ea76217c1899d00769f3086ac7