Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
218KB
-
MD5
9f2722b31e1d33dbff72610cd021dd7e
-
SHA1
b8e1649627fbd668dd59ac42f22c0926c1ae4134
-
SHA256
ceed6c85e7171d70aeb5925ac77b871e6d7c072cf6983e778fa63eb4c54fa7cb
-
SHA512
345dbfa6841f7a1502c8b6e021baa602ee86fb17157584a5bb05635e5bc43b8932c688f928394eca2acd9ab9c65b14fe29bb661b6d66b506a4f063f080ace80d
-
SSDEEP
3072:SZygHMEtvWyfkMY+BES09JXAnyrZalI+YQ:SZy2ME5TsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 804 msedge.exe 804 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 4812 804 msedge.exe 83 PID 804 wrote to memory of 4812 804 msedge.exe 83 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 1408 804 msedge.exe 84 PID 804 wrote to memory of 4864 804 msedge.exe 85 PID 804 wrote to memory of 4864 804 msedge.exe 85 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86 PID 804 wrote to memory of 5056 804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14764377866421714513,643283507929781243,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14764377866421714513,643283507929781243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14764377866421714513,643283507929781243,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14764377866421714513,643283507929781243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14764377866421714513,643283507929781243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14764377866421714513,643283507929781243,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5194a7d446031eb4796c36470919aa1a5
SHA1af0e1f7679e637b14a1c6bea5e0997770e7abaf4
SHA2565495cfc90f0917274c669e962ed2af82f3f04820116463eca1e5d1be1f481012
SHA5128b3f1eaf439e0612bbcff2883ee8c843c2452d500b43d363e26811c069e057aef1e89c39cccbb4b2e728214b821aadc27edb10c0fba805d884efc1ee50c1081c
-
Filesize
6KB
MD5ed40979978421cd73ff6cfb282df48c8
SHA1a4d009c035d1668626cf9a443077fd2a0e4fb3c9
SHA256cc3aa9672bb0a1d363285aa0c5783d91f4adf240ccd73b4be1a3d4ebf532c49e
SHA5128e462445481accb754aef471efd5a80f090bf166e484c04b0330213131534f3f87b6b45198197992e11c72c2c30663f6f35d45484557f957aa4c67660a2eab11
-
Filesize
11KB
MD56e64345367766b94792d4dcdd2b042b2
SHA164e23c0bf5a8bca89643e90d16eec9082ac31cfb
SHA2566abc68a4deddd330d9b13f31d026b07bd7124fa2adea58a9a1f4269594a9edfa
SHA51236854fe95159cf6ce30a87a050e6a0076f39816835de9cd3e34cf1afff988ad52fa1427cd78645f51fa98a4d7682dc5958b48296fd72820bcf591055252cebe8