Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
60ae23a631c35aeda5aa62515992f955
-
SHA1
26123120c465cb4b4a4cb8ee0e6fcc1bbfb92a6f
-
SHA256
a3edb187f952d88aeba5dcbb6a9a236cab1485b7e12b70cd2f319bca44b05671
-
SHA512
568d0ac4f29262633089b844574e0bbea717a207a69d859b202ad4422d2b48462da2f989c0020f62a108eac4ae5274963b8727104cad16be6cff99eaf4564edd
-
SSDEEP
3072:Syjsn/MsNRKNyfkMY+BES09JXAnyrZalI+YQ:SyguYsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 4696 msedge.exe 4696 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2596 4696 msedge.exe 83 PID 4696 wrote to memory of 2596 4696 msedge.exe 83 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1456 4696 msedge.exe 84 PID 4696 wrote to memory of 1480 4696 msedge.exe 85 PID 4696 wrote to memory of 1480 4696 msedge.exe 85 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86 PID 4696 wrote to memory of 2652 4696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7d46f8,0x7ffd6b7d4708,0x7ffd6b7d47182⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,1846033338776766701,3235316844703823781,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,1846033338776766701,3235316844703823781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,1846033338776766701,3235316844703823781,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1846033338776766701,3235316844703823781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,1846033338776766701,3235316844703823781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,1846033338776766701,3235316844703823781,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5fec6d06525fbcfcaec34081b06b58c69
SHA15858e42acb6235520bbb26052a39dcd2e6716564
SHA2562f2f2d20e3a96430cffd7afd4505b7ec0b9be85713a4f359cd457a0837854915
SHA512f8a18224beefcea3cbbe5a59d8d922c96afc458abacab38da48a6e254be19a0a3cf01210fbe85ada47e4a063cb7869fbd4fdf120797107e1cca75986a8167e20
-
Filesize
6KB
MD59ce1ddcfea6eec36660cf3994e9d5549
SHA14ca2f3e318b297be14eb729fd4baa8b6dc53f5ec
SHA256c63b2e3ab0b3e8cd304791e606169f62358ead2c642f320931299fccc80e62f2
SHA51240a829e4182e1616702ede5708dcfa34ca78ea7930e61aee75aa216c0b395ce7377e061f59a1f7c00948ad078f8c6b4672fcc086f27ec2375e067149c3af8423
-
Filesize
11KB
MD51de2d77e08e52b8a7263c5abd620845e
SHA118dece6a3096a2ef3c5c5ba16d04b65fbb756e3e
SHA256dc9d32e7d5a780fd942b908c860f29215be186cd40cc57d8857f07ebaa0d320d
SHA5128411240a6f3fd377b8b6513472bf5b9fc0b273d16fbc8826202ef6313ff8daf726695f12c6d4db1f9a43b71714c540a8d35a0ee9c35e70a7a57168d5442ba6fe