Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
5c802639bf32d0f11cafddc63fdac1ae
-
SHA1
346431462c9eeee3b2368f56f22afab3e6bfcd2e
-
SHA256
32b470f1931cd2827666c4e3b61c1bc0190aff27172185e8858bf7bcf729fbf1
-
SHA512
b5fb3140f817a8be427cb5b7e2903d22538afec8978112440818b35daa1871dfb407cf670bcf82ce1582b96b734bedbf9b6aa72509b0ca5748b23bffec2d8b09
-
SSDEEP
3072:SPREUaNUJ5dcvU81yfkMY+BES09JXAnyrZalI+YQ:SPebvUlsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2948 msedge.exe 2948 msedge.exe 3996 msedge.exe 3996 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe 5148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3996 wrote to memory of 816 3996 msedge.exe 82 PID 3996 wrote to memory of 816 3996 msedge.exe 82 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 4984 3996 msedge.exe 83 PID 3996 wrote to memory of 2948 3996 msedge.exe 84 PID 3996 wrote to memory of 2948 3996 msedge.exe 84 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85 PID 3996 wrote to memory of 3260 3996 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ec946f8,0x7ffa1ec94708,0x7ffa1ec947182⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13310557409942653739,17788926942076683420,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,13310557409942653739,17788926942076683420,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,13310557409942653739,17788926942076683420,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13310557409942653739,17788926942076683420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13310557409942653739,17788926942076683420,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13310557409942653739,17788926942076683420,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3392113c-eb56-4e63-b4d8-11ab3e3fdfa0.tmp
Filesize5KB
MD52ea06f318090696a400cb364ce6d674c
SHA152a1bbbacdfb81ae96cb44836e485f7c0ec6a5fd
SHA25636acdd9454c9aa2485395aed556a72059872dd1c26ada4c26a752fee49d8300b
SHA512d41899a93cadae9ad96c4598034741bc8707b0b3cfb0f88887fa23dbb1cc5fc2d5887750dc074c29641aa446a447cd73efe07b37bb409908b2280dd6e14be0b4
-
Filesize
6KB
MD5d52a5ff0a5fda8cbe25321da7966df18
SHA174742634f2f2c274050328a7937af83a8e9ea42d
SHA256649f7c8d2bb3686768ce61567d07237b01ee2788fe020066c1112cb241360c24
SHA51203964c96f0b121fc6954f78011fac31149b1681d7983c315c315774023de42005420b164cfd651d8df4bca0c1f9fa59489febb52bcf60e1cbbdec5c641b2787b
-
Filesize
11KB
MD56a3fc1b13309a7ac2ee9a9400d83981b
SHA1a67345432986da5149d742d64ab963867798e41c
SHA256b1438d990b31e6812130bb281197ca41785ae348e02fffc4879c9757507502a4
SHA5123cdefd7dd209a5e7d69d60804f7ea640c042d844cfda2014353d3f3a3f4fe27ff776b32a7ad20ee1e08a88a83e0feb087ab2842f18be1ff613034270b5900d71