Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
ac2051b5d43f54524e4f8dc205b0f45b
-
SHA1
00d32a56bbd4846d04bb600a3f3481793e307412
-
SHA256
1df7392ab9f22b757d4f225c9e66dbd32dcb8640b925fc547d28cabc5b0dbd85
-
SHA512
c0c3c52a0643e5828f2006b36279751f45c14359aa83e985363214964be20f6e4b8db05a8c7115afbc79b07e2c5ea0b1b68cebc767b6e23793976b816786a9f2
-
SSDEEP
3072:SbZsptOVyKoyfkMY+BES09JXAnyrZalI+YQ:SbiUlsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2288 msedge.exe 2288 msedge.exe 4640 msedge.exe 4640 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4640 wrote to memory of 4552 4640 msedge.exe 83 PID 4640 wrote to memory of 4552 4640 msedge.exe 83 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 4736 4640 msedge.exe 84 PID 4640 wrote to memory of 2288 4640 msedge.exe 85 PID 4640 wrote to memory of 2288 4640 msedge.exe 85 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86 PID 4640 wrote to memory of 2968 4640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16519088059057471070,15747324726532765618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16519088059057471070,15747324726532765618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16519088059057471070,15747324726532765618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16519088059057471070,15747324726532765618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16519088059057471070,15747324726532765618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16519088059057471070,15747324726532765618,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD510b3a5e469460c948da47e79dc2e2ff5
SHA1b9d9b2ebfbad96d223c7c3eea79ce120fefc7dd8
SHA256a570d8a97e893cd22985071980ceeed59c3dcca6dcd14f9ed0c670e8e8a63adc
SHA512a46d2881c25bec542120f31da107acfb55906f7c1f86124385c5da0a25b444aaba7e76948c665fc2e0016f3ba4705bee920a2a5786bbef5be3423fb4b9c426c4
-
Filesize
6KB
MD56a57893f46c8246848799009bb5c07bc
SHA1506be3440f5dd4fb335d23e46939b036c87d2b73
SHA256d1db0812e408cfa159263437dfb49c06ec04f8a226a9aec9b5e88580913ea72c
SHA512bd924d057ced002a8cf22f16852de44317b714e95115f7248ff0f300a50e0f5eb73e31fb51044dd04c1ee213deacc767e88ef8cabfa57a483c2e4fc584f83c91
-
Filesize
11KB
MD599cbc65b0c81581652938ba679f40165
SHA11d6b42cd5db01c42660c1f3ee534668ffa03247b
SHA25695a9929a9c917d9100cf8b5065a3e4b85fba571a050f01fe5cdc539600840941
SHA512aac5862a060cfb33b0bf95b98806c8e4bfd97355de256c9a39eeefaef5917419bd1d43409f112a6442b1ae5455804cec595d04b4795122b19847295058cd6f66