Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240419-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
61c4db5666cc1d92e60dcc1c715a10e9
-
SHA1
32e653bd740a02242e2515540525e3c8190f5eb7
-
SHA256
c25cbabe6035f7ddb207376f0b94ea479014981fb44f78d74b805e476aaca7c3
-
SHA512
fb51aee35ef2d5bdfdd116327b3045ad64937cae3c5d53285c3a7fd40bb4548eab32b0a9034d25957fa3c7f1b4f13f3bd76d7d57fd75a5a78b8ecab56b621e2d
-
SSDEEP
3072:Si/ssEQavGi4pK8yYyfkMY+BES09JXAnyrZalI+YQ:SivIGpbyVsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 3448 msedge.exe 3448 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 5020 3448 msedge.exe 83 PID 3448 wrote to memory of 5020 3448 msedge.exe 83 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 3716 3448 msedge.exe 84 PID 3448 wrote to memory of 4468 3448 msedge.exe 85 PID 3448 wrote to memory of 4468 3448 msedge.exe 85 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86 PID 3448 wrote to memory of 1060 3448 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdb7046f8,0x7fffdb704708,0x7fffdb7047182⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15739399436475164350,15083016857945752218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15739399436475164350,15083016857945752218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15739399436475164350,15083016857945752218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15739399436475164350,15083016857945752218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15739399436475164350,15083016857945752218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15739399436475164350,15083016857945752218,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD5a088db01a0ed556af153bf001baefbfc
SHA1dd1c4e19eedea8f859c3216aaec6b79f895364c4
SHA2566401ad856b787c9302534333812dd1ba5058235fcd114afcbfa27584a5e20091
SHA5120816548016d37678b4803b13747fe38e5b2d4978f921601b121e9b600afa88ea148af91b39d8b00d6456f31b51cee106f66046cf69d2535913c5c7aa18a71efd
-
Filesize
6KB
MD5684d21d66e66cb8e38738a3dae7494cb
SHA1aa76c72fbbad3788df298ffe1cb8ad6baee41dfd
SHA2567f25ee9a515073cfd93be6a29b3f6543d860b437e63dd1ad009f07f9154f68b4
SHA5121734dd5ac23cf3900437a15607c081dd9293bd3c0d13daf351acafeb97c510181f378e41435aa418b5b29b0c86d8ab56cfa48ee6b3e4eae708fcb735e8677d79
-
Filesize
11KB
MD5ce86fc6557e4ae7d96695b6bf358c2e8
SHA1fd700c492e335fce6f0688ab8eefca3227b7abd9
SHA256bebcbe859327e5aaa68615a42a67749c6fd4286a41332a19291e141b955a5415
SHA512aa0a13e4f4c0a2fb5f451eac2a44988db4adef1743f8dccd213b6f59cea93c53bf76a22fc404d0d1fe8268128dd03b004fc1695adfc26f5e61271deea3cd2b58