Analysis
-
max time kernel
142s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240419-en
General
-
Target
sample.html
-
Size
41KB
-
MD5
f4f5ed6dd679f982f7e135bd38cbfeaf
-
SHA1
40dd9938aa5e6b4ffaf4ddae498aa7ef1626bf9b
-
SHA256
7594cc2f1a66010fff1ff24c38b480e2418513359d39ce0bbb1fc97c6dbea7fc
-
SHA512
7471208a1c834e2ff7ff860ddd7b21c4789682b3b5135d862e3efa0757e815fe765609079f39e22b681beb89ac093808267b8a82914f728e7a4a2fec4ee6faaf
-
SSDEEP
768:S3mh0OEZ6BQbLrQrT9CJgBc3Z8vfEL+8JTGE1J+VL1aZmOU+yzQBU1Pj+POeC1Vh:S3mShZ6BkLrQ4JgBc3Z8vfEL+8JTGE1a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 928 msedge.exe 928 msedge.exe 932 msedge.exe 932 msedge.exe 4304 identity_helper.exe 4304 identity_helper.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 932 wrote to memory of 2308 932 msedge.exe 84 PID 932 wrote to memory of 2308 932 msedge.exe 84 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 2044 932 msedge.exe 85 PID 932 wrote to memory of 928 932 msedge.exe 86 PID 932 wrote to memory of 928 932 msedge.exe 86 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87 PID 932 wrote to memory of 4560 932 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffed99846f8,0x7ffed9984708,0x7ffed99847182⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 /prefetch:82⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,930219942141864279,14839670588838662893,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\99d04aa0-c300-43cc-99b1-fef80c7979a4.tmp
Filesize6KB
MD50df4e6e1144f78651f2917371a285dbb
SHA1e36405283cc47e9174798b7909b4b5e992453ffd
SHA256490ecee79afa6cca377a2f09fac5a4eccf9ce343ac86c47ca7931156df0540e4
SHA5123fa8f2af4fe89e4043f4c302e345b15459ee2d8398318bd63a33957da2cf5365cf89bb07fd4558de7db9dcf8a226a50ed852577d82f6ea3aa1ba7cfdfa7a738f
-
Filesize
5KB
MD53bcac65f5f1c0c52c61ac8bc981bea69
SHA1bc6fe8e8bab965b2faaea3f433dc97b815cd9132
SHA2566aae07e26a248e4d77e537faf77d89d191d9cb1acc033e0b30af9d2a09a671dd
SHA512a03d0cc24e08acebdf4ae06bba4b8dd8ba518fb7974218622f654028eb8bd2b7e81a75d5a257739c0f8054df60218815ef0579237d317bb9453f2078029999c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56d44e6ba4e1bc59cff08e606774d1e88
SHA1646f60836e1ac6d1379acfaa9dcb5c0287a9b952
SHA25604d3a027b07a8a8297585cef3532b445bf766c3062c2d9e2c09414d1745ac0e8
SHA51228c867860d9f958ed1cfc8e19b6ff5e0dc7a01aacd8f2bbfd2ce1f43ca4c62d7b8854ef4f3d389b65b04d5732610cb7a0d8c0cab4b74ce5065d8ee687eac1f0d