Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
bc01bae131bf592edb9bab833646f71f
-
SHA1
cdf45024b151680ebe626963b13904bf030afa65
-
SHA256
8f98fd4c2bf8363122113b2e41091a835e2dce5f1eaa61fb20b7b64aec42ef51
-
SHA512
9147f1ab14eab804371ead3e18200e87f4e78ce772b04b2935d1b1dbceef5cae4b65080bcddb847d2028e1c79548ce7c74b4127c2e23269f11ba5278ef6ac837
-
SSDEEP
3072:SpX/rpJeH9iq5uQ7yfkMY+BES09JXAnyrZalI+YQ:SpXDediJQesMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 4140 msedge.exe 4140 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 2076 4140 msedge.exe 82 PID 4140 wrote to memory of 2076 4140 msedge.exe 82 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3508 4140 msedge.exe 85 PID 4140 wrote to memory of 3488 4140 msedge.exe 86 PID 4140 wrote to memory of 3488 4140 msedge.exe 86 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87 PID 4140 wrote to memory of 1360 4140 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa47b46f8,0x7fffa47b4708,0x7fffa47b47182⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11585771615690709805,11853564574175741584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11585771615690709805,11853564574175741584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11585771615690709805,11853564574175741584,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11585771615690709805,11853564574175741584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11585771615690709805,11853564574175741584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11585771615690709805,11853564574175741584,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5da91dde5b6114c7887263d1848fd1884
SHA1b41305b624b8852834a3e0d95df32816d2732516
SHA25609103a89855452a2a66a179ff585c122c4784307878e8740ed2cb04b2d270572
SHA512bd16a6f8b8b0855922073e12298a425cc6a78aa685e8bd27d1548219dc22c55328079a5a7c699047fba3c30706ed1c842e11fda084a27859b6aa727ba9b51e87
-
Filesize
6KB
MD5912bd18b0e7e32abf14c5be5b3139ebb
SHA1f6075b55a8c9db48a5ee2e0957fb3740f6586ae7
SHA256a895ed41112238276a4c987636033625bc3de748558c160209fc69ac0a1eedd3
SHA51209de1e84aac8b743155cc45d907f8cd7f1fb2842427c2d60e7ead0dbf554a2479f0a319e348ec2c584ae2d889498967859b00a2656bd70d8b798d85330748048
-
Filesize
11KB
MD5262456310e5c1a34a33d4a6edf395ab6
SHA162a48107493b95dcff371edc61e259fb9e49e998
SHA25691568c1c29745273365429c3e5594df2292fb57cd3d7d788cce133579c52eef7
SHA5129d53427377e63cbe6f9edbe7234b8c1c2c46b2e640562cea7eb1a025e521cc24684be4c5d33738c85d36ccf89b41eaee9759fff35e3f861a5c9278621d6e8274