Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
d95d9856f7872835d84856ecdecd4103
-
SHA1
1cfa4f164f1456d6f0dc6d8d1151b402fcaf46eb
-
SHA256
75936c2c6fd15e801842bf328e857e1158d6666a0d61f2b54fe47375c50a66e3
-
SHA512
e542c1ab0c906ac259a2a88b9251c2178979a929b43630662169878a77f50de2c05bc59058e6a9a8405ab319fdc1d0f0eb1ae9c9c71c98282e024d2206416a62
-
SSDEEP
3072:SwMmAlZfGWyEyfkMY+BES09JXAnyrZalI+YQ:Sw0uJsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 3052 msedge.exe 3052 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 772 3052 msedge.exe 81 PID 3052 wrote to memory of 772 3052 msedge.exe 81 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 4292 3052 msedge.exe 82 PID 3052 wrote to memory of 2408 3052 msedge.exe 83 PID 3052 wrote to memory of 2408 3052 msedge.exe 83 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84 PID 3052 wrote to memory of 1540 3052 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb1b46f8,0x7ffbbb1b4708,0x7ffbbb1b47182⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3075018111095807416,5145628849950757501,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,3075018111095807416,5145628849950757501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,3075018111095807416,5145628849950757501,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3075018111095807416,5145628849950757501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3075018111095807416,5145628849950757501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3075018111095807416,5145628849950757501,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5f800e02295b041c7f1e985175c8cd922
SHA1e9f8bd69a4580432686b3e52b1ce5e794a8fc43c
SHA256b77b8026332072f33fd07222b26dca9ca2606507329b1989e32e266e12177308
SHA512e8c01056fc5dd52b1b8696a42bd1da051fe2328c90898bba413eb0c31be5f6da7e842aac87074059d05f0fce9fa7466c6b5c04aa2d369f3ddd0e67a685fae25b
-
Filesize
6KB
MD5f20d80bee4ea340de0b2b2fbef4d4472
SHA1ff4e9f838dfb36a46ad16d16b51b4bd459c8c556
SHA256b58e9284e8ca0c693959af415cf3e1ae7bbd9af7da4fb5c2a8a9cd90346403f8
SHA51216f81ac9d161e3ba318054df1a7628625952b6c0858fc0504743ebaaff494f1264e1182b022764f7094df3acdaf0015b2292783142cdf5a7c915d0b54cffdd9f
-
Filesize
10KB
MD529ce2f03aef31ceceb7019bda66a1da1
SHA146249cc18705a502ced59301f3138c80fa5382c4
SHA2562072bf95a52e50d2af60ff4346d4e6e06b61f17d338e8e5adf01257f0246beb5
SHA512291ff4c6a58693b24c1d52097d756fff1b6687988e8c19b16dbf2fb29125f4dd5df9574c76613a9094e34b80fc9e73eedc2a678fc144d6495a44964923cdde5c