Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
BgiRw.html
Resource
win10v2004-20240419-en
General
-
Target
BgiRw.html
-
Size
18KB
-
MD5
a367d9ffc0a11bc4d96d76bdf6786177
-
SHA1
c1903644a6ca8113012eab02996b7163f670c911
-
SHA256
012689f451ecaa492b45777009ed65b09844c8b1954ffd9f904cd5f01f906266
-
SHA512
e802cb94553730bfde87c1d65c63362e7eb42c656fed277f6a5aab12412dd3d94cffb2584bb2595d84878ea3a5b05b05a8b9d8fbe62ee2f67183bdf2a84abd83
-
SSDEEP
192:LvF92JICf98Ftf2I0pLI0pdhgf98Ftf5JKPF5iRj/5rRjQ+mTDsiHiMi6ieFM:LvF9pFWhNFqiFvjnkIiHiMi6iyM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 844 msedge.exe 844 msedge.exe 2896 msedge.exe 2896 msedge.exe 3664 identity_helper.exe 3664 identity_helper.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4620 2896 msedge.exe 84 PID 2896 wrote to memory of 4620 2896 msedge.exe 84 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 1412 2896 msedge.exe 85 PID 2896 wrote to memory of 844 2896 msedge.exe 86 PID 2896 wrote to memory of 844 2896 msedge.exe 86 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87 PID 2896 wrote to memory of 1696 2896 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\BgiRw.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff14d946f8,0x7fff14d94708,0x7fff14d947182⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3864169384689997766,12987050003180392071,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
313B
MD565ba140ff9e4bf30381b0479f9d9dd08
SHA1b76af5c2568f6e2cb4680b9e1abb80d5b15fc906
SHA256673401649afbac136d0cda301b731276653818466fd7dc560b0a80c36a145b39
SHA51230a57bd389a9cae8634a627301c5e0a21702d999a4af3f8967dd32e6326173a1d9b02e11172295c1d6dfb2260604536b4c695ad3ac317e5eb210e1d047e55eff
-
Filesize
6KB
MD577d52b44d049651c96628c6863bdbd7f
SHA1509ded2839f0600179234fde26e3c69dc07113a4
SHA25672f83889594cfef4d9f98f89c059e14509d785bf1ff902e09ff011d316d437a3
SHA51218cfeb2f23d2f67c1588c65ce2078e694a313212868c7fa613fd23c34ba3d2fd055cafb6944127646df2ad1d1531343eabf11d1cd1aafbd5f94b75ce26bedc6c
-
Filesize
6KB
MD53a439529b38af8a41b94c292ebac28b1
SHA10fbdd09ec01b61d38b25e3acfff141b1483928ee
SHA256a708065d4544d910754007ea98d802aadce76dab5ab14731590dd0a15fc7df04
SHA512f39a47e8f8d392c75964625c969211352146d01fce33326591821ed128661e70001b891df3c73b6bd4627c00a4fe4bf13830060af92f672ed921dc6c37b095c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57522d84a76303709c99b5f37749449e2
SHA19d4c3e160054324b8ebe100dbe73ea6e4c90381e
SHA256fe773a79fcc8e60e43619c68ef2369a02ba569d16689a7a92710186c39cd0bac
SHA512e84f5bef2a124b110f584bee20ef3fd1a2ff269a12724e82485a5ec34065e349fd42feddd6a7022517c7cb83ac2ea0273ed7e2ed1662340827fddd553d5f4d80