Analysis
-
max time kernel
1783s -
max time network
1687s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
a3045ae45634fc24d2eefb6e666062ca
-
SHA1
4c058533761a988a38f8be2795cb63fcc4157df3
-
SHA256
a4c38f3658f5d94e169ed54d2cb3e1e73975f587c85f35810275a037702c2864
-
SHA512
6090a0381a24aaa382c4c6fc51b56b374be308e044875dd3b2182ef209937556502fd8de9005851706dea7b7f7bd2545f048788d19bb5c0d2ab1d8362f30019e
-
SSDEEP
384:rpGs+DpmReVoOs4Xi9ylKeGMFU8HhhbNNI75ko2paWhOwob0JN+LIJCgMmVn:rpGs+BVoOs4XmyI1MJBhbHm5tWhOwob0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 5096 msedge.exe 5096 msedge.exe 4364 identity_helper.exe 4364 identity_helper.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 2980 5096 msedge.exe 83 PID 5096 wrote to memory of 2980 5096 msedge.exe 83 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 2528 5096 msedge.exe 84 PID 5096 wrote to memory of 4468 5096 msedge.exe 85 PID 5096 wrote to memory of 4468 5096 msedge.exe 85 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86 PID 5096 wrote to memory of 2640 5096 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed0d246f8,0x7ffed0d24708,0x7ffed0d247182⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,11816305769960452844,11115427926457161620,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD59c7358d82b433d56dafb8c14051642d5
SHA1a33730860b78307d234163f6e53d5be90dca3b92
SHA256882f1ab5af06717233ea065358be204f8231825b47d17d496866663ec23845e2
SHA5127bcac76936613a3f10eb017ba73fe2b6d1d0d42df69ea90d5c715f420cd9491b7b81a8ab343cba796dbb7801848763a06352915f4a19944ec237e5e34537bab9
-
Filesize
5KB
MD50dd191579299d5e373b2bdc237352076
SHA1f2385056b0b7f9780acefbcf24953595bcf8015e
SHA256a113f18e1f10f0c7e48384cfdd57809469120d590f0578f5721fbd6e6e6dee72
SHA5120d15c521f668358ef00b70307284bec0ba48d4dacdcf2dc54c898cb479ca050998c94be2bacd16dd49177dd23092bd64bf058e00ea6c23f6d004623e608a757e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a21f63171820aea939b8f2278fd61009
SHA13601905680b25ac2703041b6ac9d1506645647c0
SHA256994c6c172ba1fd63e3ec99a699ee357fe8702f9ef6982642ec1d3e82d36ff578
SHA5122b4bf824b8e1601e70cfa5bf3c1266021abd6954b0cb9d938a4033dd599f57d034da3ac3551c96e88a5cd192c4fe567f1cf6505983c2a6eaf90f28c26c51d7bc