Overview
overview
7Static
static
7AVI高清�....0.exe
windows7-x64
7AVI高清�....0.exe
windows10-2004-x64
7AVI高清�...��.exe
windows7-x64
4AVI高清�...��.exe
windows10-2004-x64
4AVI高清�...V4.exe
windows7-x64
7AVI高清�...V4.exe
windows10-2004-x64
7下载说明.htm
windows7-x64
1下载说明.htm
windows10-2004-x64
1使用帮�...�).url
windows7-x64
1使用帮�...�).url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 01:13
Behavioral task
behavioral1
Sample
AVI高清模板加载工具V5.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AVI高清模板加载工具V5.0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
AVI高清模板加载工具V6.0【普及版】.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
AVI高清模板加载工具V6.0【普及版】.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
AVI高清模板快速加载工具V4.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
AVI高清模板快速加载工具V4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
下载说明.htm
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
下载说明.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
使用帮助(河东下载站).url
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
使用帮助(河东下载站).url
Resource
win10v2004-20240508-en
General
-
Target
下载说明.htm
-
Size
3KB
-
MD5
0b8fe8ff07dadc5d6ebf3f51a2b0f553
-
SHA1
e963810e7fd5b205808460e657717bfc37de60be
-
SHA256
dea5ace1f689f26b16a395e31f38203fe064bd3fd118cd1cf0f54d79669b42ab
-
SHA512
b06baaec4bf4d8b9c4888a9ee04cfdb36a3a78a0792d03782f6d7ca34baef3fcf8186cc44514336c9d609b804e4dc2c54fd82fe49b0b04f1edd858dec1639cf7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 220 msedge.exe 220 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 4292 220 msedge.exe 83 PID 220 wrote to memory of 4292 220 msedge.exe 83 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 3884 220 msedge.exe 84 PID 220 wrote to memory of 4692 220 msedge.exe 85 PID 220 wrote to memory of 4692 220 msedge.exe 85 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86 PID 220 wrote to memory of 3296 220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\下载说明.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb649446f8,0x7ffb64944708,0x7ffb649447182⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1852 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,17803405901831865200,18140945411946802931,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3464 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD57613f29c482c131a5fca8df1d8aba046
SHA1c14da531c65ab276f6d6257c5068c79b72513c09
SHA25689b4c98c85280123547c2962ab76d6e3ed602ede4996fa53c2e5ff20c2e99fce
SHA5129bc3ae352e8661f7f24153b6c56e8ba45af920df4c737dcbb22b0b9073371185cc5b761795a80748c89e6c537427cb6df407687826f7bb259c4232db0c1cd3e1
-
Filesize
5KB
MD5f8c5e23cb65e8c89b2427662eb3425e4
SHA10146c525fc7688d39124dce00abfc9f91491bae1
SHA256220258bf19dafd36f01216c7074f3e93b23dc386bdb09dee122bd9afa7ff6ba2
SHA512bb9c7700565aca9e663e996b2bd0a49ffdde97790332df07ccd8b5c46d6c0adfc6e9910b7d631811aae86d14d5d188f07896fd56a60b720eed61ddb4d3b85645
-
Filesize
6KB
MD513cfe12812492685746be4a5efe69491
SHA175a512e3fddd917cee562607482a9170698d3faa
SHA256cdf4a78ec10e8a17e96981c7d6fd474cc8ca0b96584fc2fb1a5ad7b3ad2c0582
SHA51229f04d10384abc68c2f9b59add5dddd1a1205fc2e22084212daa785d641a71fded142a737b6b7795767d32be0e956c1c402f1fdc4d6b00837c4e90ffe8851c03
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55ef7d9d9837752456330098f67612e1a
SHA1532a6c4634119e5de75132a4d318eca1b0a7c713
SHA256c7678f1b87daabe59e911028e4fc1bf27a2d4ef0725405f03862949c01361c9d
SHA512a625a17b99252cf91185670e12942bd553a64082f0f9658e1573a3e2662de09d3d0af1f9056a675782051152e0fe638bb6e0b289724478f2e51047aed528d36d