Overview
overview
5Static
static
1newpage/ac...ass.js
windows7-x64
1newpage/ac...ass.js
windows10-2004-x64
1newpage/ac...x.html
windows7-x64
1newpage/ac...x.html
windows10-2004-x64
5newpage/ge...ass.js
windows7-x64
1newpage/ge...ass.js
windows10-2004-x64
1newpage/gm...ass.js
windows7-x64
1newpage/gm...ass.js
windows10-2004-x64
1newpage/gm...2.html
windows7-x64
1newpage/gm...2.html
windows10-2004-x64
1newpage/index2.js
windows7-x64
1newpage/index2.js
windows10-2004-x64
1newpage/page2.html
windows7-x64
1newpage/page2.html
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
newpage/account/geoplugin.class.js
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
newpage/account/geoplugin.class.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
newpage/account/index.html
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
newpage/account/index.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
newpage/geoplugin.class.js
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
newpage/geoplugin.class.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
newpage/gmail/geoplugin.class.js
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
newpage/gmail/geoplugin.class.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
newpage/gmail/page2.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
newpage/gmail/page2.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
newpage/index2.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
newpage/index2.js
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
newpage/page2.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
newpage/page2.html
Resource
win10v2004-20240412-en
General
-
Target
newpage/account/index.html
-
Size
19KB
-
MD5
ca02d1d6af46ed775ab70ab300f6c8bb
-
SHA1
f3a9aa1adf47521db3f98292b2f416df90e7b6bc
-
SHA256
cc2663af10dfd3648f940a6f993ed2bdc0d842f1639226c302240c433a19c542
-
SHA512
3e39a674ba9308a08079f5017880d9c739c30f2622ab845939b502ef5d03f2005e9bceefa8ae1a946fb9d9a1e53691258840a425261d8c2fedbdb28f68d44136
-
SSDEEP
384:FVT4djdEhbRGENC99ItV4OkLsPA2YaA9dmeyi+:450b8Ec91O4rQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1500 msedge.exe 1500 msedge.exe 1972 msedge.exe 1972 msedge.exe 3728 identity_helper.exe 3728 identity_helper.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1972 wrote to memory of 4864 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4864 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 4752 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 1500 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 1500 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe PID 1972 wrote to memory of 3680 1972 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\newpage\account\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8522546f8,0x7ff852254708,0x7ff8522547182⤵PID:4864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1668
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:652
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:2792
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6101493362834625256,12999584948537068393,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
203B
MD57f682555b9a717fbdfa40e3e6a705279
SHA1bf3ecf42fd4ecaab2a2651b44404f99c9d636a9f
SHA256aef3ac61b005edc44fdf0e7c664427ed0f111adc79e78d3d1aebc567b57c6b9c
SHA512789156d84687970b385dde02666d53ce4e15f3918edeb6b01ec84869c2c993aa640e99bbc6881ba85500f29ea26582ad0e72f5f5e63087b92caaf3fb8fa68c0d
-
Filesize
6KB
MD50e0278a88a84b68800e9fa4a8d550d53
SHA187f5a551b5c61848a3cf7d27c37a214dc48405a5
SHA2566ff7a4fd7858b1baf3e5539d21d5ceac71883804d11ac4f4325e36978d8b18a2
SHA512a8aad5c4be04db19ff4f7aca0b7df12dcf428ac3f98398e4a7d2485b2d4e9a69a8a0eb189cb05bb63bf92c906223376467265191fdff1325bfcb83b368d9c49b
-
Filesize
6KB
MD5bac0c3d60caa3c836f4aa764c9a53a77
SHA148ed9a5a91dd71f8c08e1234293796a8fe567ef0
SHA2567eb0d1924e005101a9b11c9f3a85b9515aa08db1ed0d57752717b181bd343ada
SHA512a49245b74bc2b681f58c3ac1e49631de55c28fda76612f3dd3e6caf9a0f209955f1e7759fba3304e360e265188d3d9da59e6cf57b2b6093787254f3bc3b50b09
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53aaeff76ddca5d4b2077c089c4f42438
SHA1d30acc7eb9e485180ae302c5afa828be75bb1009
SHA256b42554c0320bae95abc7e837357af9d39722f645547e75e3e4989c0ef113a98c
SHA5126bc4cd9bf4062fdd7d80fab6caca4639bccf12f245a8f51405c15192cb0b30e715a88db0a63f3a3d8ce83daacfce857be8c8fd344054eb76166c5c7095c2518f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e