Resubmissions
01-05-2024 16:04
240501-th2jaach66 129-04-2024 17:15
240429-vsye2sgd2t 829-04-2024 17:08
240429-vnv45agb91 5Analysis
-
max time kernel
1680s -
max time network
1687s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-04-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
.html
Resource
win11-20240426-en
General
-
Target
.html
-
Size
1KB
-
MD5
e7c33e896fc6a6c7d635fc478b7ed5ef
-
SHA1
b2b0e2d14719a991c2490cd6305d38432cfb5b01
-
SHA256
bd454f23ca60e35b9442b70b28762e9f8e70116757a0a37ac30335b6aff8ffda
-
SHA512
1aab589a70e9f8058483fe128fe490baec3f676dbfa8840bf7084fcdf5aada519d697cc250faf67586ee29abbdafdbae64c24467b3d8ea86419aa4a76dc12dda
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 4728 msedge.exe 4728 msedge.exe 1796 msedge.exe 1796 msedge.exe 776 identity_helper.exe 776 identity_helper.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 32 4728 msedge.exe 79 PID 4728 wrote to memory of 32 4728 msedge.exe 79 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 3224 4728 msedge.exe 80 PID 4728 wrote to memory of 2676 4728 msedge.exe 81 PID 4728 wrote to memory of 2676 4728 msedge.exe 81 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82 PID 4728 wrote to memory of 3064 4728 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc6ed53cb8,0x7ffc6ed53cc8,0x7ffc6ed53cd82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,4092441478723687456,4473828185745735023,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58e1dd984856ef51f4512d3bf2c7aef54
SHA181cb28f2153ec7ae0cbf79c04c1a445efedd125f
SHA25634afac298a256d796d20598df006222ed6900a0dafe0f8507ed3b29bfd2027d7
SHA512d1f8dfc7fdc5d0f185de88a420f2e5b364e77904cab99d2ace154407c4936c510f3c49e27eed4e74dd2fbd850ad129eb585a64127105661d5f8066448e9f201d
-
Filesize
152B
MD5ffa07b9a59daf025c30d00d26391d66f
SHA1382cb374cf0dda03fa67bd55288eeb588b9353da
SHA2567052a8294dd24294974bb11e6f53b7bf36feeb62ce8b5be0c93fbee6bc034afb
SHA51225a29d2a3ba4af0709455a9905a619c9d9375eb4042e959562af8faa087c91afafdb2476599280bbb70960af67d5bd477330f17f7345a7df729aaee997627b3a
-
Filesize
382B
MD585a087d7e7f1bad8496ab3c287ee5e8c
SHA1761418dbba7787f99db22b3fccdf687d1d2faa56
SHA256011aa200860355f59b61c03fde2766b944ed95f819364790c8dd5617aa6167a0
SHA512c4354b7a6265da0f05d4636587bdf50fd830960625605efc254c78a16f6d1b04e7fb445817b2e34fabb6089346d2dcb5f59e9ed5ba9c79b2291bcaf73ed4a489
-
Filesize
5KB
MD55c3ebd0c7b99288ff23cca5e71d7d991
SHA177309b20c10125dfc479e2454fdf82e13eca3991
SHA256ee3afa81011a361704ef2225a9732f28fd9d6534776e4f39942ff8d0eeed6b6e
SHA5121d541b0aa852a27b303887a1262aebf3e79558e12f01ef7bcf34caf2c1ddf121f2aac28c13cdcab02ed94a4ad584313ed4a01a6073ed37c2581dca99964e39ad
-
Filesize
5KB
MD504a708b383dbe3fd404d2cedc5a2e45a
SHA1dfbacd8ef75fb44473129a57277f229779e67208
SHA256aa5fbeb489ef4e76cc2b34cc2aebf43b48deb0824406e40f183a8175db3469b0
SHA512ae12b191086ad4de2bae147dfbf7538bfebe53eba0fb08a5cde4ad7f1a784f3507c1b845fad512d6fc26f4a436c7ac6ceea5f9c70aeaf58fe9446e1c62f93c56
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD591a04d1f98fc51723a61129d745e3920
SHA1d47eb471f21fe3b9bd3783281d7a143ef070be98
SHA256029243415572421663f0af7ce88f10f637b93b1cbc5da5d1108bb19be6889075
SHA5123e36ffad41e87c84dc0d0047d776aa9b8114bc924997b03c6ff545e0feff13d1671d78a7823080c9d298ad2a1bc820d614b15be89c723359682b381e1eded661