Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
79KB
-
MD5
74631d18b58362e820b72f64b7306117
-
SHA1
6fa2f43a561ecf494b0f2303f100c813545bc935
-
SHA256
f193baf70654836223e09047c14496af292ece717b85cd82eebf9378fab2553d
-
SHA512
4255e013067bde94c66eefa376e144b01764a4df2a8f603d20c73222051e83899712812a0b86f77e49fe0e9657ce247cf840c38ea153648854b309d4e591fd2b
-
SSDEEP
768:tIRFmlxrjJnUhpgRZFWECpPqykuFImo/izbneSJfuD/jp5QKPqVUiwIdk6znipJK:4Fml7NFWZpPyueh/iX32JgW2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 3044 msedge.exe 3044 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2752 3044 msedge.exe 83 PID 3044 wrote to memory of 2752 3044 msedge.exe 83 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2100 3044 msedge.exe 84 PID 3044 wrote to memory of 2320 3044 msedge.exe 85 PID 3044 wrote to memory of 2320 3044 msedge.exe 85 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86 PID 3044 wrote to memory of 3704 3044 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaeba946f8,0x7ffaeba94708,0x7ffaeba947182⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14569607358043056210,15868706588033661914,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,14569607358043056210,15868706588033661914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,14569607358043056210,15868706588033661914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14569607358043056210,15868706588033661914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,14569607358043056210,15868706588033661914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,14569607358043056210,15868706588033661914,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD531382cdcb713c1e591c03e2b05e0294b
SHA118bcdb2c88378f6b6a674d03f138fd217b43add1
SHA256266c44568a6f323c372aa11387b975c8385a461b52c454d88110c4e1af2c8b05
SHA512c46ed2ac5815fa31101aa9a986c3bbadb795a8b560aa665e7036de712404d65f70df18d78a7420e9fb55cdab01be54444315a74f2c7fb9d1676a2c69bd941bb5
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5b34e7c19ab85168ca12896eb27c2e628
SHA102d3adadd3e1ef2619f4bbdf1881307240994943
SHA25682d66a0af73fdca52e97fa6718c53c9e13b1c3ed67cecfae762598ede60b30cd
SHA51279bd93779d0aa4e414d89e6c78c8eaba37c38ab28f2ebff5dc7f965fff06cfb5bc7846ffdcfe2165e487edb75ae75a6d15e3a09251f5cc481f3fd41a5b4b8223
-
Filesize
6KB
MD53e6852951a1789d200a4e1f698c1499c
SHA1ff14727e984c64996f390caf3fabcc4ed1e75c98
SHA2562722fdf2a208088ae7a34a35684c7a08380327d49ed7925097f132639f2feb34
SHA5125b4fd4d378b9905248c925b9e760e18a5b6e0fa42c6c28458111d77bc1b2c4222ad53ca9a7c525f74fc61629a7a9a08e322f220bbfef8bbc05bc9d546f45a335
-
Filesize
6KB
MD58e25b322b96c760f080cb6ad9279f318
SHA1d6d6bc3802780f5bee35c305c1f0b60c953f6d56
SHA25693b1354d7fb10cc462a9175770717fa6abf949c8776f3168382ff06c463ef4b5
SHA512c68a97bedc6097d2bb5c55c8ddeaaee5348cd531ed3a82e5dc650fd517b05fb75093da29ee2199e6d987914b27594790c5a4c17df890b24dcceda953b39865a5