Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
Mirrored.to_v3.0.2.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Mirrored.to_v3.0.2.html
Resource
win10v2004-20240426-en
General
-
Target
Mirrored.to_v3.0.2.html
-
Size
14KB
-
MD5
c1d3782841464b6587dcca309897bffb
-
SHA1
b3e740682182e5203ee4e9c87e93c4b72ccfa6c0
-
SHA256
953031f727dce95e76f8d47960248f09eaf2a167444baddbe7a9d80bc59cb18a
-
SHA512
fa09a83a807e7b7144ee8fe9ac0a0452de24c182651ccad570a9bd61e5d7066bb18c6ddd2cb10e2bce6e947690f59728e5e911ac5bce3668435245978c9f3a28
-
SSDEEP
384:soXIrHaeZxL7rIad7E5paeztOd8l9ue7a0U:siIrHaeZxL7rIad7SaeztOYseO0U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 1924 msedge.exe 1924 msedge.exe 4376 identity_helper.exe 4376 identity_helper.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 716 1924 msedge.exe 82 PID 1924 wrote to memory of 716 1924 msedge.exe 82 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 3452 1924 msedge.exe 83 PID 1924 wrote to memory of 4688 1924 msedge.exe 84 PID 1924 wrote to memory of 4688 1924 msedge.exe 84 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85 PID 1924 wrote to memory of 4280 1924 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Mirrored.to_v3.0.2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7745154008527316620,1598489514263671488,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
953B
MD5ba5f4d88a37817676de0f0e3cb8965e2
SHA14b53ca86b90989de6b497c19fd7167701cf329b0
SHA25683d6b175b9bc5ce28aa317a090d4f0b72e1cb68ee1e3c69a91d519f148b62409
SHA5121faf69fa0639191232bfa03f0e73ef0ec59b31a455e89c003da8a86469d1ec939e1062c39775cb000b4ae286e07264c8aaf70bd4a342e79c4d482b4a8c94c42c
-
Filesize
6KB
MD5346b6ebf55c741ae8906806fff0aa4c7
SHA14b41e51374aacdd9ea6d4ba8e8f78c03624b1438
SHA256af67da4c9a613b522fbc0adb260b12f11026eaff7a89a8655cb18a2c7a4f5a9f
SHA512e7400c8e53819380bec3f34694ea72f2aa55c33ff704a1bf2c8b569a227b54f0fb26673fad90a619312990e656986b022f900efdc7ac815198c60b6096f28715
-
Filesize
5KB
MD51e56d024ae4202234b7cb1982a0df8dd
SHA18be0a4b6b810abf9180d3bad4b26552558434f82
SHA2560b92b70ba962a47f6b237c2d8eb52d19911de9339f7dc08ead89775c8d145730
SHA512f3c28691c95c51f98a1f37c1a19e39446e4c157605b7482a02b322526aa6881ed9319cf0073ed66fc8115e5d28db6330fc969f3a49c35a93f38cdbf9fc951cfe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b8d70befe1d2c10b2a9b1db3a9c6d394
SHA15f0612aa630d0ea74eb9d00653f9ace0a8efc5e9
SHA256b934039e4f9fab8943ee7075f88380aca0c6a1a2845c61d52df29931ac0e45e5
SHA512731501b8afe9dbe1890756228f7f5347088501ebe2c780ed0ddec300edb7d53ff3da27c661a1697becb2e6685a62b288f06e9a047ab64d4e4983be42d28422bb