Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
40KB
-
MD5
fd82d8f2fee39a8080f533e318c1c99b
-
SHA1
05a9d0b8f1b78214576818f32c37f6731f28aa9c
-
SHA256
36602d2427953b6361ffd6a39e15bd2913a2be273058893d76f7cfd96afe6605
-
SHA512
34b0f4e1ef1911bf1723fe661b9c6962df2b337fc56c8c3b8945dd14c72240c8347487b3910b0e943100f037e402d829730f9709285a9c145175655daf21f15d
-
SSDEEP
768:Semh0OfXHpRKfNTOd14KPBc3Z8vf4l1+KBbyVxJ+xUuvlmm+nVfaB4j+n857tsXR:SemS+JRKf0d1jBc3Z8vf4l1+KBbyVxJQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 804 msedge.exe 804 msedge.exe 4108 identity_helper.exe 4108 identity_helper.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 4984 804 msedge.exe 82 PID 804 wrote to memory of 4984 804 msedge.exe 82 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 4624 804 msedge.exe 84 PID 804 wrote to memory of 5048 804 msedge.exe 85 PID 804 wrote to memory of 5048 804 msedge.exe 85 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86 PID 804 wrote to memory of 456 804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847182⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3195741939390428828,4552601627129578912,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD58da09882cc8c317ba62144588b31278e
SHA162638b79d0bac7cac6e2c278a82a4c2a78f5af12
SHA256a34ba6a829bf09f6c3c503503e1178716cffe22e4dac04d2b83ecec575471552
SHA512970416f9bf5867df6872537fb97f62c06cd04543fbaab82476f69b4ce8c1bbf34a116dda84cd67dcc458245d617d24a27c7e2988f13c26ebe79a1ca05dd49408
-
Filesize
6KB
MD529413fe35f34be284760d346531c209a
SHA19cdfa854fcbe239132f5497b8c306b559cb5ced0
SHA2562cfeb898a980deb16fc00a632c293836f82edfdce7b9965ac9c136297f4131ee
SHA5120189360c86e5e158881cfd839ecba23e38aebeedc93beb4da58916e4a231d8b341110597d9e412edf343ee847569a7aff9797bc3d377bc61fa0f72796a9bec1a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5474d8ceab5a39628c6a8aa95863f2b62
SHA1eeb1c0a5b60a7e6e6b82873f75a1061e51ade961
SHA256ebd3df29989a8f28e454151208885b2170c986d6272655756cb999ab780d773c
SHA512a05feaaf5e5ffef3aa52a3924b5bdb327aff8f332e98419c9bcfff3ebd9bb95ee60dbb3d09ed88ac2d19acfdf084602542be31857b99340caea9a333342c3885