Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
7e8537d8bb430fec177aa3c555e46709.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7e8537d8bb430fec177aa3c555e46709.html
Resource
win10v2004-20240508-en
General
-
Target
7e8537d8bb430fec177aa3c555e46709.html
-
Size
116KB
-
MD5
7e8537d8bb430fec177aa3c555e46709
-
SHA1
9d80f82158589a1d1836701efb88bf151f33e5b6
-
SHA256
3492e6f0bcfce00d6b056eba446d2e7ea8ad7e81543c02180c877aaa130c3823
-
SHA512
c17b31ad0abb63a6286351b1a79e1e9b9eb621777f58adfc380f0ccb9d3f4fbd991e965bd0091dbe33e2a3f3fd66852c3d602bd5e8cf90b6d47568f718ae04d1
-
SSDEEP
1536:WyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:WyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3624 msedge.exe 3624 msedge.exe 3588 msedge.exe 3588 msedge.exe 1244 identity_helper.exe 1244 identity_helper.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3588 wrote to memory of 3860 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3860 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3152 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3624 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 3624 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe PID 3588 wrote to memory of 1140 3588 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7e8537d8bb430fec177aa3c555e46709.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86ae746f8,0x7ff86ae74708,0x7ff86ae747182⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13436844416704958170,14699465549436104362,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5f6159d74a0a30f5e0a872379063d6a37
SHA15e8ee523afca2fced6a0a0ecb69f365398343757
SHA2568c138c7078fe3c73d98e8843ad2a6f016301628857c6178dd2995b69022bc91c
SHA5125a9561c857b77bf8a31d54fba54d82566fbc1b0b45dfd06e49cffa85870509367c26c85fee70447430fbf016f30943456197b53f5a62389a8dc81b244acd0747
-
Filesize
6KB
MD50a339251cac25bb93b94b90c422fcd65
SHA16e607615a0c9d934c71106e2c07b71f7b4ca0e39
SHA25649cd436654b00df2b2cfb7cb78cc14f09e0d018c3c51f50fe9063039d4ed5302
SHA5126b18395820b55a509f13581e6a327a87efa480756be32305a2b390e15cacc71f5ccbd515f4c7fe09b2e204bcb24bd3ae5780bf659b0dcd9d63104536e91465d1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD576bae02aaa16dc23fbe075720ca517a1
SHA162ac97d7090af984c818ae75944479016bb176a4
SHA2566178e255648d72af00f2b84a6af4659ea13e962c8f139ae8643dfd7257b40f80
SHA512e9bc4a1eb4e6c7e04f1c180714061b3b22435d42b6cd1f727107a69e1307c6746f2f6b3f90843ec0bceb652bf9ec9e184636748580181b7729d2e2c2aeca0d83
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e