Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
40KB
-
MD5
ac7f4d2570184e22d85d4bd95780bb82
-
SHA1
38aa00e74bfeaee23b259168967e542bcb590dfd
-
SHA256
99018342373794f7251f52033d48c4891a20e1cc8decbdf24e0e4bc605293879
-
SHA512
10325c3a5bfe5029f7ec5b48214bf203b5e3e3eb1d17b41d13feb4fcc7c494ff31dcfd80db8d2c90d36f885e04d3be9ce5d972bf3e33e180dd4530ae8513553d
-
SSDEEP
768:SXmh0OSRmKxwgZoHu+o1DNBc3Z8vfhZ+HLdnC3wJ+jLYQY+C+YaTkDPwj+eaDKZ3:SXmS7RmowgZFnBc3Z8vfhZ+HLdnCAJ+b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2044 msedge.exe 2044 msedge.exe 4072 identity_helper.exe 4072 identity_helper.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 536 2044 msedge.exe 82 PID 2044 wrote to memory of 536 2044 msedge.exe 82 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 3000 2044 msedge.exe 83 PID 2044 wrote to memory of 2180 2044 msedge.exe 84 PID 2044 wrote to memory of 2180 2044 msedge.exe 84 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85 PID 2044 wrote to memory of 4008 2044 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb1b46f8,0x7ffbbb1b4708,0x7ffbbb1b47182⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2296 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1996 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,13848746170739492331,11218812916194217875,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5706972a83c3ba3f943aed7486390c4c5
SHA15ebe9a05230d526b278fb4e5189f0dccba6463e6
SHA2569351faa37a5101adfeaf44812ffc174b14fffbba5e44341617820bc66ef65320
SHA512c63f438833a1bb9f20d8c1b7773d872d299cb20c2ac53f028222512a8af7c9c6466eb3a871583f616d620bf2dc28d6008833f5f7ead6cc034879b495936adc00
-
Filesize
6KB
MD5a0c08bc555f40d86a013492782c37037
SHA1f5a468ae0d7b674e98f7f08bbb220a23893b06e3
SHA2568dfc8a9d0d200b0b2d0fca7ddc98568ae296ec005bf66fdcb762ea47d0865d86
SHA512a010bba763b940c1b91827f2946313658f32cf8c23ca6ad035b1e1fa2c3a76456fed980b6242b9cca89c8120d4e858671ba72e3a63df08403d12cb12bf19f429
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56f31734767119d32579f8753f44ac6f4
SHA1106f1c45e276a4432a666d70ec6de7d4137ffd4f
SHA256b45c4aa75812df847d57d8a53ffa2f130425f0e7c701a51f361f3454d1982d07
SHA512b5443cb94c0718f41785e89a14b99dce7f4350be0435dcf9fc3ec0f4a4f36759e6403bef67d752790254708055891eae92697c250f8aa93aa49db02758cbe3a0