Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
dcc700d0103b76d2ebbd2eac2be8d86a
-
SHA1
e5d95acdde89160eb088015e7326cd6f15b0880b
-
SHA256
b870c776947eb7108fa4db04ecd4dd5209d6e163400961539af313813befc6ce
-
SHA512
61d5cd14cdc74ff613decd38444a421d303286dec7d968d5056dad8d06b013384c0b58591ecbe970ae58896e069d555e696fc7d983108419586dd53cbd111b08
-
SSDEEP
3072:SMo5OwS/PDwjyfkMY+BES09JXAnyrZalI+YQ:SMwfGsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 628 msedge.exe 628 msedge.exe 3724 msedge.exe 3724 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3724 msedge.exe 3724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3724 wrote to memory of 4296 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4296 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4500 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 628 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 628 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe PID 3724 wrote to memory of 4432 3724 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9eb546f8,0x7ffd9eb54708,0x7ffd9eb547182⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,15522318005105261495,2084616671535090626,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1800,15522318005105261495,2084616671535090626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1800,15522318005105261495,2084616671535090626,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,15522318005105261495,2084616671535090626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,15522318005105261495,2084616671535090626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,15522318005105261495,2084616671535090626,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD503473b7c8fbda3c1ce47fb8659734534
SHA1ace9347a9c5bde5a627940c4efa8df76a5bdb8ac
SHA25652fa1827edbc1531756f9011cfc7ddcba8a302069635d560fc751e6b91a6c221
SHA51287b9bb44b89d99cd8774327f88fd4b1dce8e4ade7af3e399c4f6f17009553408efe4bd7cdf348e15134b639577b9571c92dce500ef0377a05e1ca21f0e3ea552
-
Filesize
6KB
MD5e39800faef0621a0bf4a979ef7be743d
SHA12feb77a88e3ba7cb50be7a664a669ba55a62beee
SHA2569fdb6710f918b483b5f8ee5b14959fbce93687d58b591d5db73a561433e18352
SHA512f35683aee67f8daea6b6007d15f35989b07277992020667eff984efa81de0b70556870fa1873174772c2a67df2275ec568bc5ffd0588797973b1c15459c0d24b
-
Filesize
11KB
MD58eee883743109c0fc9fa682597a3f9b7
SHA1e37ed8b9289b082b779038d4ae9d4b609b7fa404
SHA2567e8ad9bbcfb96fc0e1d152c618fb8de1f90c1af4ba7adb746828aa833014f7d6
SHA512ac5499d56b64b517cac72f383b95b91a7a200bb1e6abc9a6c48a21d5cad34c3b806e22dc16ca7c6661c43ab1660918ebd5708f9088b32b0f100e0c5fc615b146
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e