Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
41KB
-
MD5
be5003c81b2ecd6651105c53d293a7d6
-
SHA1
03d9f75d43275a11fa0fadddf304fc324434e348
-
SHA256
72b9de52ccb63a43c1d1eb2514a3d3e0b7019e97d64fd279a8078ec10d10ed1f
-
SHA512
56e48feabbda44dab24569ade136a864e1e64ee241deac9493b98f5bc8588a717fb0a5040a75fb0f4276d510409db30d28fe7bb5ccb3ce417afd40562102e228
-
SSDEEP
768:S8mh0OSRmCpnGxK9fjBc3Z8vfkp+qMWm51HJ+0fkK/Wy+MK1hjLj+21kghY3+kkW:S8mS7Rm6nGxOBc3Z8vfkp+qMWm51HJ++
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2964 msedge.exe 2964 msedge.exe 2156 msedge.exe 2156 msedge.exe 552 identity_helper.exe 552 identity_helper.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2156 wrote to memory of 2616 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 2616 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 4476 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 2964 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 2964 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe PID 2156 wrote to memory of 3276 2156 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:2616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:3276
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4748
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:4260
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,17038730334494827899,5139207210808996821,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5f018e2d0218cd9abda8b35cfaca09543
SHA1013746d48db277cda5526532cf7fb6cc26718661
SHA2569d6f7b9e0d639b8d0f32eb8e7577b90f62628c5ed3c1207902a264b859103e11
SHA512938ac6a1cc2d0caa1eb7b6ec0b86003a9beae526af29982af7e7b0256114166111f8280b996d38ec61556b97efe235b8f596d305626c79b06a3da765140754f4
-
Filesize
6KB
MD564b6e2d5f866f27adc8311db52c1eb6e
SHA1f5e500bb728f6e252f3a89e27a28c6404565e02c
SHA2569544c3c6185cf4b4490ee8c466bea7e7722696bb22c7bd7f122c664e5ac8a371
SHA512c7fce2c517b93376c62ab37932a4fef9c9599c34a616c98aa9b42979e72d08b431754da965829f33c06b89693acb3f67696fa4fe75c681f5ca050c69ebe2b298
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bea2550e73914611dfb4a2c2f530411a
SHA1a7091108832bde9ae6d0243936b3d3fe8b1319c1
SHA2564e7220a93c878c82006e5666f600339ac980dca7710300982572e551f8a908ea
SHA51254f967b079d9be6c09c4e8cb812bc801b309c216d23a1118128f9ce1f751ad66ec65d530247fa3d8543c621d7d5819f1d44321b42f13d6cdd88b0926754235d5
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e