Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
362edf7b00313d2e35b37a6bc29fde75
-
SHA1
2d20827700c24c9888c9af96180c67460aed86a4
-
SHA256
776b6ad244dad8e247a6ca74eaebc13ae46d85c10ce2094a83adf8cc9f9dc369
-
SHA512
e02e9f987d6d1c91f4183a1f2d7c83b0b34c533169af9fc01c993549024ec22171b62d6242e0b8884ce8ebd4d7dbed89015ff993f3f049f32e5b3f7d3fc23be2
-
SSDEEP
3072:SSnAoimZAyyWH3pyfkMY+BES09JXAnyrZalI+YQ:S+AOJMsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 1040 msedge.exe 1040 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1040 wrote to memory of 400 1040 msedge.exe 82 PID 1040 wrote to memory of 400 1040 msedge.exe 82 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 3032 1040 msedge.exe 83 PID 1040 wrote to memory of 4356 1040 msedge.exe 84 PID 1040 wrote to memory of 4356 1040 msedge.exe 84 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85 PID 1040 wrote to memory of 1468 1040 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047182⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9766963260320363586,6801001574496392341,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9766963260320363586,6801001574496392341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9766963260320363586,6801001574496392341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9766963260320363586,6801001574496392341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9766963260320363586,6801001574496392341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9766963260320363586,6801001574496392341,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD57b87ea8b5b248faf712febeb0d28205f
SHA124e642ae82c3d3deee9ce83371615df1329eac45
SHA25629adffc61d206e08de943eb118df104e73580ebe6ad0b470ee9c6caf88cebee4
SHA5124acf61f74c27bcc961ee752335653c57b405e655aaeeb2ddfef8647480b93930a4c51d4eacbdd1c6e65c48d08582c0088097409b0a9611705bf5a660b16f1617
-
Filesize
6KB
MD59de0c197ad2cd109cdc2165714491862
SHA151f240195909eff484fc5c10d17a0a6fc0234790
SHA256cfce6b21cf1ce8348895a67baa7ed439850793afc2509559054960f8c526016e
SHA512f622718e0c97c61997f9480c19c004fbf1ee39e7c1bd78eb566e49e82f53d88f8c81945d88fb195c7723aab1f1fbfef9266e24dd01270c4d36da34632cb5a07d
-
Filesize
11KB
MD554028e5b195e3ae2d183016f777f5322
SHA133e666fd70ce0de48f24d39c664ed1a313f0ae86
SHA256cd0a1806d67b3e8816374e1f3f399ef39fbe9fbb33bf788bc9c86a00635c999c
SHA512066e490181bd267a4008491a3bdc07017ecdc4eb4c6c4dc2d76ff41aa33c4e08e1f95356ca3ac67d31270812076389c2fe1501a4bb3de62556a87fa9d6da56d3