Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
3e821530460d9240af38aba278c386cc770e5d1285a7476e091ab60a222a9029.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e821530460d9240af38aba278c386cc770e5d1285a7476e091ab60a222a9029.html
Resource
win10v2004-20240508-en
General
-
Target
3e821530460d9240af38aba278c386cc770e5d1285a7476e091ab60a222a9029.html
-
Size
46KB
-
MD5
6cdc4401c424f974abea8594c5efc2b6
-
SHA1
9b8fa861bec5baca72a427c5bd8574334df4bcf5
-
SHA256
3e821530460d9240af38aba278c386cc770e5d1285a7476e091ab60a222a9029
-
SHA512
74ae1f48a2ef26bea99818aa04af08a2cbf00173bdd1306eb1da0bf402956a7ac672735eb0472604f1e454ac157dbbda4c3db94f0360be1c807fdf7620ba1bc3
-
SSDEEP
768:rGEPMNGA9k9CHQuwah8+ZPX8+BRb6tLA8+xTgDQ5p/GIj:nPMv9k9CHjhFPXtPtTgDQ5p/GIj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2180 msedge.exe 2180 msedge.exe 768 identity_helper.exe 768 identity_helper.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe 2180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2176 2180 msedge.exe 83 PID 2180 wrote to memory of 2176 2180 msedge.exe 83 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 4404 2180 msedge.exe 84 PID 2180 wrote to memory of 2268 2180 msedge.exe 85 PID 2180 wrote to memory of 2268 2180 msedge.exe 85 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86 PID 2180 wrote to memory of 2128 2180 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e821530460d9240af38aba278c386cc770e5d1285a7476e091ab60a222a9029.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe32e546f8,0x7ffe32e54708,0x7ffe32e547182⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,3397961929043438999,8828235334995427746,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD58c5831adb460d5cecd6031fa4c75638c
SHA120bc3b6ded3fd5dc08a634481705a34e16099711
SHA256d2d36a73543a9b9fb0c73101d32fb874734e0ec59bf011e0fa929effdd3865e6
SHA512ae991ff63666335e9bdc2a54b778ef7d826167af9d654108c35ed2289102aa3a81b3c03ab34de19bd1f404bce1405f8d2c0f5fd5e3efa9584e9672333c5cc7d0
-
Filesize
667B
MD565ef5d05774fd508ef4583b82a25493b
SHA16bc9dfb9c5fa64bac343f38b83df789fc22ca7ad
SHA256f0f7b82d350b985ec465aee416a50fb7888596cf65d95717cfe965befe4d07eb
SHA51270ea44c1edef3ea3720e61234b418d46622b9014029940de534d454ab960230a9a92d43f18488619377af43b06b924247ed4ec9af50f6a0dfb3bc9d871c79013
-
Filesize
5KB
MD5cc238cede6dc3308f9090558f8462bc3
SHA17dd6c69cc1d972718497895ae6b3179926cfec6f
SHA256f1f1df9eefdbbb0f5ae53dc81d0a159c71ee41e012265ede8fd083b1153e34bf
SHA512e151ad1d7590c72bdcde282f6fd2706834e538a7f6ce7dec9f76811752219ea558ecd1bead726dbc05905ef73c9167cae274b2eefd07272fb3554a73c2a1c2ac
-
Filesize
6KB
MD5a8c60b7596d17772c6dd681cfcee206b
SHA1ff1a1c556d05ffd9fa9c1b8a8dd12ededc52f0c1
SHA256672bb0e1821253662217a55d22fe7c6e0b238ab516b04b1edf33a59d31833870
SHA51287de2d2faace16352b700c4130e110e5c59dbe7ee62e5058214fa053535fc5d850ede8935e503692d6210e9d9d453645f22eb66b58b6d5ac54b83c689058e911
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55bb236ee078f8553e998bb6a78c7e842
SHA10b7f223cf77c2bd3e9c8c4a862a0e51b1fb624d7
SHA25669d081edd238fd78c2e3e9214d3048866d9856ff2102567fdf8a7089e3af7033
SHA51257cd6fa7b2396bafc79b866929e482ee322419ed951da9b39c409a06db1585265fba3c8d025913130beb1e7d9509695536e30d7d701427083592d87772f15c96