Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
hk.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
hk.html
Resource
win10v2004-20240508-en
General
-
Target
hk.html
-
Size
38B
-
MD5
85bc66cb6bb2ad18d55c005732808147
-
SHA1
312ad4eb903d9973bf114a1b844409894a1cec15
-
SHA256
15bc35f63affd385d023faa9af2b93cc2e3b546c8a593ec5de79856f28c85846
-
SHA512
fd231c1187ae3f0f98be241440a7887fc0c1c3bf3c899cb99310efe6434da0e9ba15b3dcc0d2d90e5c4e5700a91dc487275586cbf35bbe180bd188ab20f5e707
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 64 msedge.exe 64 msedge.exe 1392 msedge.exe 1392 msedge.exe 2948 identity_helper.exe 2948 identity_helper.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 4812 1392 msedge.exe 81 PID 1392 wrote to memory of 4812 1392 msedge.exe 81 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 1160 1392 msedge.exe 82 PID 1392 wrote to memory of 64 1392 msedge.exe 83 PID 1392 wrote to memory of 64 1392 msedge.exe 83 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84 PID 1392 wrote to memory of 4192 1392 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\hk.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe811746f8,0x7ffe81174708,0x7ffe811747182⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,4398599730327917698,286099759552380194,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD58fa04bd3000aa1722d54b3de2cb0629c
SHA1fb5509bbdae14d4934be1830d07bde1907375e38
SHA256245a4e9df5129cfe351ae2db59e63e5b34372d86e1b3ea0a26c08c41fd1d9dee
SHA5124d264ae66c2a0609187232b2c703623aa7647578588872d5f3007ed62924f8b10059453923aada315f05418d68b6070e967671ecb9746c19e991fd54f63f9566
-
Filesize
6KB
MD5a2b107d619d91182916e08419698a1b3
SHA1b30b75e9ed141e672dfe46639fe255ad5fd3a6a5
SHA25646eddfb3464b772befe37da7ac52ce24cbe36308ab06a49248a0117179b0a59e
SHA51211c7a3b5f53eb67d688289ec485a034390f19d61807cf5f7227c1a9b8e89478009968b8ae2bad1b3de682bdc630da171aff9c2004ca0f5e3ff9affb2eb9dbfbe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5627cc1db71a9925c11885300df7d0c5c
SHA1aac1db32dbcda8543478db899b0910c65837495e
SHA25609f38c45036cd1ed7a1b40c41d0d46440f81d219a993ba60ac3de1cf98688463
SHA5122b2d7aea4c5aa69cbc48a76ddce570db0b3dea673dc45ee23c406f6d8407afb207d3f2907ae5e41c9aebd493637ac230f019b8b959d88775b86fbb415e4b7928