Analysis
-
max time kernel
55s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win11-20240419-en
General
-
Target
sample.html
-
Size
22KB
-
MD5
766a59bdaf4fa3afac62a5d6e235c5fd
-
SHA1
f8326d321c0556c51e6d7a4394fe990365696c31
-
SHA256
905488543230d8e4bf567e323ba7b8b855175e31d8e66e32366396db9a67ad9b
-
SHA512
636c1c7d8b65d0ae5fb15cbebf2de87330d8872236f5dae03a2daab3c04b1f966776472b8fdadb976c30f219ae62450bbd8c831e1f4e65b06afff8d6f154e2e2
-
SSDEEP
384:dZAOrlJnU4qauYQY3YCjNmoV20JpyhmsW1XxYAYsZRS3pvDSzZU3VM4:dZAOrnU4qauYQY3YHoV2syhmsW1XxYAc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 4272 msedge.exe 4272 msedge.exe 3952 identity_helper.exe 3952 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 208 4272 msedge.exe 85 PID 4272 wrote to memory of 208 4272 msedge.exe 85 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 2132 4272 msedge.exe 86 PID 4272 wrote to memory of 5008 4272 msedge.exe 87 PID 4272 wrote to memory of 5008 4272 msedge.exe 87 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88 PID 4272 wrote to memory of 4380 4272 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3ded46f8,0x7ffe3ded4708,0x7ffe3ded47182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,349804562735045347,6964832480168281202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
6KB
MD51aebdbffb4391d727a656b9a0df8101f
SHA1bd1f01362f48ac7d24e17025ac18b4df5e867970
SHA256596ead5d1086e645a5c061d79dc7ef85417055653c1323512e3276d41ca22016
SHA512a31559aa88e6166a1bd6801923d0dd21290da9f47e266661e79030ae02ca527a9d72a6187fbf522f5a1c575a5642a1fd707829399405ca73627be1e2cb3d8620
-
Filesize
6KB
MD5f3349afa8187f0f51c162ba7df099ce3
SHA1e4adef6f2d7e41cea57f5b294b3b14bc2ba60fc3
SHA256dc371473cf865e360e38e0a9b4aee7f2ba3adb8b307d7572b29f9cabbf94abbe
SHA512ff11f808128fdeae78f43807d53e6c8067274c0925fd71f6a9b5639a292b55683fbb1dc211d59d333cd646bd7dee14eae7657186f177955ba8961812b27b50e0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD59508282a99d7b1bad25cc5cf7b4199e9
SHA128b95aed86f08fdd36dd2807da1b54d278f942ed
SHA2566f44e9fc8b4c14400b154142f5d0681b6e454ebe7657c8a43a969da81b3e26fa
SHA512b09d74342427192310587cdcf444388a6366554c018e7ad7810311631bb2aed8e8be13f901097f0de426ede7988519545fc33681a289680912b9a33beb26e3a6
-
Filesize
8KB
MD5a9bf2f1868bfc7006587900262c80525
SHA1d2c10260c57673be6fef14a30a86a9a2d1479fc2
SHA2566d7e8149439a888a73d4ef083e0d449933b096bf5a22306b0820ff5c65da5cef
SHA5124967164edc44db9b5e65fb90e3f18f9fd9d13e31c4d504e9c93c448182a3cdcff6f3858e43c66469c2a24775a536cfd94d0eea47e82f2a66cf782379b539ec87
-
Filesize
264KB
MD5c0f2ad509576f677af63ea6c170c7236
SHA1f32c7f2dbb7190a7016b87db2591f19ba1d5e9bf
SHA25619cc35147dbc4f763ff44613cfa8e7b211e81b2295c0011238d857a678d5fc0e
SHA512dd96607d37ae52a9d1e2209f52ee249de3a4c7b524a57611ff3131dc15034645360a4381ee769eebc6deac451e72731ceec4ea002389f8d7d0f917e202f1d1db