Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
41KB
-
MD5
389c2fa616df796922a762006cb8aefc
-
SHA1
d09dcff7e9b7254d83c8eb5884a2c411dff5f6bb
-
SHA256
6fefee7dd6f11e03e1687daca27f96f4ec0f75f98e5f272f1fe56da0b6a5574a
-
SHA512
85825d4adeb510fa648dd482bb6f9253dc45d25e883825cd17276c22f55a4e146921b901700955d1d986b25ee1acb0855c5b5986ef76f268e9bfb7e354e4fc4b
-
SSDEEP
768:Stmh0OfXfnf/M1PpBGpBc3Z8vfB9+MhY/aRJ+XyQ5PfR1+mYgwH1j+md8tPmR+TU:StmS+n/M17QBc3Z8vfB9+MhY/aRJ+XyJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 3252 msedge.exe 3252 msedge.exe 900 identity_helper.exe 900 identity_helper.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2604 3252 msedge.exe 83 PID 3252 wrote to memory of 2604 3252 msedge.exe 83 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1076 3252 msedge.exe 84 PID 3252 wrote to memory of 1968 3252 msedge.exe 85 PID 3252 wrote to memory of 1968 3252 msedge.exe 85 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86 PID 3252 wrote to memory of 1324 3252 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffca1246f8,0x7fffca124708,0x7fffca1247182⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10080324204562705396,14354714678371707357,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD52d08f273477c5946dfc407b6f7e2004a
SHA1f8ba234b21ce31a6374cdfbfd28ce77e61927e7c
SHA256c2376fecb41d04268221d31284dcca8ab68e2aa87ddd9243c763f5f388b02841
SHA512b1f5494cdedc08b7448a88753b2cfdb09f4c6d2468854b1ae73fff6d7265b29f5e29e401394e7dd92429fd39e544f0145b815aa52f3db14fccf34bde648d14ec
-
Filesize
6KB
MD5a1362b54dbfe16078a71baeb4c2329af
SHA1935580ca1f4ce4b418bbf5604603e1ff84d205d3
SHA256983a24ce255315e570636208253a85957173b77728b45d8d93c0da3e39ede108
SHA5126496df30091da3f06b032888b28855fbdb25335d87778674e13ae07ae5b994dc22dac68ae72e6b715ab9e56927757664c3d3bf1059bb5f7bc0abd5d70cd9355b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b8c79a051680ac9a4024e14c1a8cee5c
SHA14e2b2a12c8f77aa81cb696472e2ce3256114b643
SHA256a06af74d966479184b9dda454e21d2b406a80a74a33fe597d34eb3a30ce2d2eb
SHA5127ecb19f2ccbdd501938e969fe73d5ece6709091ea7445c642cd2ac0c4a63873722ba5bfa2075adbaa9cb72aec6e488b279b010aa89b002c37693b20b348dc4b7