Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
05a25243bfbff3dee6374f95e68d58aa
-
SHA1
92b0c28a934f2ef18bdcef1d6ed5eb6510a0a4a3
-
SHA256
3fd38506cc13865ca3ab39053f08079f7bece779059c315048e5f4a2c9eeeff7
-
SHA512
ab284297381c29dea7b848752516ef32a41bfd41c0ccf20d855dcda651dd56e6bf6df60b159ca6cf825c6cb9066b8106bfcba66941f6e1ba2b0e4e0f6b8d875b
-
SSDEEP
3072:Sl/FEDLd6vQyfkMY+BES09JXAnyrZalI+YQ:SlggNsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3920 msedge.exe 3920 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 3948 3920 msedge.exe 84 PID 3920 wrote to memory of 3948 3920 msedge.exe 84 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3312 3920 msedge.exe 85 PID 3920 wrote to memory of 3012 3920 msedge.exe 86 PID 3920 wrote to memory of 3012 3920 msedge.exe 86 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87 PID 3920 wrote to memory of 4804 3920 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffffc5d46f8,0x7ffffc5d4708,0x7ffffc5d47182⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11370587539227757535,1650842692856952327,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,11370587539227757535,1650842692856952327,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,11370587539227757535,1650842692856952327,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11370587539227757535,1650842692856952327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,11370587539227757535,1650842692856952327,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,11370587539227757535,1650842692856952327,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
6KB
MD5461b59fac57495338ba898a351bab699
SHA11448ebad1103c1a5d85d3c5d633fdab900f2af68
SHA256f1da93b920fa74c20981a94ce9acf55ed072f4949ecc0c51626e54f70633ca6b
SHA512aee84fae0e80e054c43e7b3b6ff3378aafbf55fe208d475e28fbe58504c9a144efd115e90f6a04837c81242480000065ef926fb574fd02af601387d6f61559ec
-
Filesize
6KB
MD5d4bb861f0b5c5a669a73da6e40a56f4c
SHA18c0269cee0edfcbd37f4b1fb940e2348b5907404
SHA256c6893515b1f6847b810dbd462ee4947c9a30f61ab2fa932009551d4c9d99c8ea
SHA51273cb791b34103fc50d50cf0c08ed26c50b9dfb1186c9101a53130ff6e37824001237c0b901486908b899ecb0e0a1e7cc0dc4384efa62c5249e8a376af59ba3cd
-
Filesize
11KB
MD55f262e8e93f004df7b932bdd9c1a3833
SHA16a5df26b3e6667ab60833c5b2297ae3ebfe21f6a
SHA2563a471ec953fbf712f5548e8510dd225ce62defc5adc24b34aa1c078b52b38571
SHA512a131cf1d49838daa556ac29d1e03e9b26152852a7a66e5d616a56d1c3cde0ca3dc4377a6adf7b827242fdf530857146e4590ce3be9d9a2e22cd4c0355e782056