Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
Mirrored.to_v3.0.2.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Mirrored.to_v3.0.2.html
Resource
win10v2004-20240508-en
General
-
Target
Mirrored.to_v3.0.2.html
-
Size
14KB
-
MD5
bcc4be17302fec6ead2f4363cfad3f33
-
SHA1
9abe6a4508059ce3703c9caeaf5d47e35031c3b1
-
SHA256
a6a4f538beb9c42b67965bac529a2b0b5a6104c51a1c93a9b961dd80cfc0a114
-
SHA512
0e971b444aff3450569377135f28324d0e6b9f40ff64ca3125398aecc73cd4d060d5845ca1923c6bb173bc94829534dc9deb6dee2b86aacf1b29ab9c78213700
-
SSDEEP
384:soGIrHaeZxL7rIad7E5pTz+zabdZl9PKb0U:sdIrHaeZxL7rIad7STz+zabRhKb0U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1068 msedge.exe 1068 msedge.exe 4276 msedge.exe 4276 msedge.exe 2896 identity_helper.exe 2896 identity_helper.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 1728 4276 msedge.exe 83 PID 4276 wrote to memory of 1728 4276 msedge.exe 83 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 2444 4276 msedge.exe 84 PID 4276 wrote to memory of 1068 4276 msedge.exe 85 PID 4276 wrote to memory of 1068 4276 msedge.exe 85 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86 PID 4276 wrote to memory of 4312 4276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Mirrored.to_v3.0.2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe69fb46f8,0x7ffe69fb4708,0x7ffe69fb47182⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8898948309413706052,5467676751778139305,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
953B
MD5aafe7dd6495f3b66c1a541a7c612b686
SHA1275721bba048b25cfff427a804c8e81fce453e5f
SHA256ff5ebb0dcd936cd6cf110504fb0aae1afdd2f64fa215fbd41d964fd4f90ec6f4
SHA512500b76c42ee4f8f670af1f7b0514f06f792ca0d507e43d838261e2ac118ced80411e1aa86c8a766abfe2f219119998c0e994c855d35d1789f73793d40c6e67c9
-
Filesize
6KB
MD57789bf23ab96aa83ce8dda5757610bc3
SHA1844dc9d388618cd4644c37c1d515009fb69eab15
SHA25681c7d2c0bd5a9d4d73f4c52c2a24a324c45b58cd2f32e435a3999f3c8c435756
SHA5124daa96827f0075d90f0bd834ff39a20870b261b0031bb86592f9e5d43a77c40d2886230265dc92b6cef0c4598ff768cea9f2ab45f118eb4d1071048fe9559d24
-
Filesize
5KB
MD525e0278746d0d24e8cbd0592e0d3489d
SHA1c6049550558744b90c5269a3e469d9ad3d6fdd56
SHA2565dbd96fdfbd4d6d69576460e735d6036992b7bae0f689e0fa22d42757737505c
SHA5123ac831591f36079cf8e7444c1715c9307894dad8ba7cf2ba14d993b7f71c34620b9bc1ed6b33c55904627b2314d1928159b011946db5c444da1c58100c7af7f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD517015b46356a07a102ab4a4c558283d0
SHA18c38ee4a542e453e30df47cc65f1064cf113bea7
SHA2567a7bb494a5c598c75b81549eb1b931f91e18a762af86e9b06f75e6afc51a3163
SHA512b16f030f119b2593438a3c0f1d8c65009fec6bb0260ea0bc606d76ba8118377be12a4a26766bd82b2024d940a03d4162652663ddbf1ff8fc60980d71753c15e9