Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
4c712241058eb2b8871616f048825301
-
SHA1
cf30f094286fa9db47244a8f6f9207b29649b6d6
-
SHA256
5c7654e146fbaa06354566e33b1647adf2c368c13156c6e83dba119852695cb7
-
SHA512
437b9cf576b29c0657219532fdf96995ba9c9893201c970f7cb01bcbf9db7db9a60513835a276611b6c941d91322d58db0302aab14328a493f6b00618fc57c91
-
SSDEEP
3072:S1NDYCkOr1mD1yfkMY+BES09JXAnyrZalI+YQ:S1yFEsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 396 msedge.exe 396 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 3516 396 msedge.exe 81 PID 396 wrote to memory of 3516 396 msedge.exe 81 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 4876 396 msedge.exe 82 PID 396 wrote to memory of 3472 396 msedge.exe 83 PID 396 wrote to memory of 3472 396 msedge.exe 83 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84 PID 396 wrote to memory of 4224 396 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffd6f9146f8,0x7ffd6f914708,0x7ffd6f9147182⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4866309938510793250,5249543674110673908,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4866309938510793250,5249543674110673908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4866309938510793250,5249543674110673908,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4866309938510793250,5249543674110673908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4866309938510793250,5249543674110673908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4866309938510793250,5249543674110673908,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD574251e5ea6a1a1fee2c69384b6a04760
SHA183783b4a73df6d1563f87989c700764832477fb5
SHA256b067aa6987b62ab607a60f599103ad62e44ee5bc44856d49bf3ce7d61fdb0ab8
SHA51266465321b9315500c64f2150e88df50e026be448be2058a741101727f3ee601a0ec9a716fb33830549a52fbbd007d9fd45d8df6ec8ec2650ab5444d4988e6e86
-
Filesize
6KB
MD596279ce0ff2833da936d180e3204aef5
SHA1923a0da78c3f852d1efc19d286bfe01f7df7c8d8
SHA2564240e03b4e6a2b6b64890c9ad0d1ee4241b92ef3fab4c00741ef1f6e16ba9351
SHA512c8dd4b8b02659c0a6e228e02fbd95084ef19c7285297d47c72ea44f1943e41c9d989dd81f04a68a90ae5d18f8c1563fabee564e2f2d048f8c3e41b541a29efa5
-
Filesize
10KB
MD53130209a797ffbb2c32f8b8653cf1f7a
SHA15ce5d65a07f856ddd4536cd52579b3a228465c82
SHA2565f647d7b3b2d1af542dc0229bc32fdf31e680a2316e59f7d14eb3b71491fb4ec
SHA5123ca3835091d2dd5162393d31ed726bdfd463896277c0a8b723fbb92567f3f292de244e0853fbf14e4d37a27742f2e61b1a022ff5a51d85c93b97df470be94d6b