Overview
overview
7Static
static
101-HTML-fi...5.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...1.html
windows10-2004-x64
101-HTML-fi...9.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
101-HTML-fi...3.html
windows10-2004-x64
101-HTML-fi...9.html
windows10-2004-x64
101-HTML-fi...0.html
windows10-2004-x64
101-HTML-fi...4.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
102-downloa...ok.hta
windows10-2004-x64
703-malware...t3.exe
windows10-2004-x64
303-malware...t3.exe
windows10-2004-x64
3Autoit3.exe
windows10-2004-x64
303-malware...hF.lnk
windows10-2004-x64
32024-05-14...ty.ps1
windows10-2004-x64
3Resubmissions
01-06-2024 21:09
240601-zzxvbafa7v 7Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
01-HTML-files-13-examples/May_119275.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
01-HTML-files-13-examples/May_234892.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
01-HTML-files-13-examples/May_299872.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
01-HTML-files-13-examples/May_328152.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
01-HTML-files-13-examples/May_436171.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
01-HTML-files-13-examples/May_446619.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
01-HTML-files-13-examples/May_447386.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
01-HTML-files-13-examples/May_554063.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
01-HTML-files-13-examples/May_583479.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
01-HTML-files-13-examples/May_654380.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
01-HTML-files-13-examples/May_673434.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
01-HTML-files-13-examples/May_765966.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
01-HTML-files-13-examples/May_787116.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
02-downloaded-HTA-file/ok.hta
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
03-malware-and-artifacts-from-an-infected-host/C__ProgramData_febabbh/Autoit3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
03-malware-and-artifacts-from-an-infected-host/C__nkll/Autoit3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Autoit3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
03-malware-and-artifacts-from-an-infected-host/StartMenu_Startup_Folder_Shortcut_CecBBhF.lnk
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
2024-05-14-IOCs-for-DarkGate-activity.ps1
Resource
win10v2004-20240426-en
General
-
Target
01-HTML-files-13-examples/May_673434.html
-
Size
61KB
-
MD5
ae96ed9e0e5217dc6219fd2e0c7fb526
-
SHA1
08081b9cd39ed40f8051a1b8eed2b90d5be4b707
-
SHA256
28c3ecfb7bf397fb6713ca739162b676f57b58fc10a62003e1bc2d9f364e4cfc
-
SHA512
8d142a2996a9304cdcda417ee84b367ea0314293e1fbef07a302b003328f4620520965caccb164fbcc2170fa000e486ca13cb2214c7ad47b01fabdba5197acd2
-
SSDEEP
1536:UzxuJKxK7kdK2FlBNt0kLENLOZ3m/A9H5dyM:Uzxu6xdK2F//B04m/A9H3yM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 2544 msedge.exe 2544 msedge.exe 1080 identity_helper.exe 1080 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3448 2544 msedge.exe 83 PID 2544 wrote to memory of 3448 2544 msedge.exe 83 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 3012 2544 msedge.exe 84 PID 2544 wrote to memory of 1948 2544 msedge.exe 85 PID 2544 wrote to memory of 1948 2544 msedge.exe 85 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86 PID 2544 wrote to memory of 2264 2544 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\01-HTML-files-13-examples\May_673434.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12722254245346371370,342238479732351335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
183B
MD59e1275231d0007b3a42906cdadb34ea6
SHA1de552221fd88afa25f6cdeceed2c825d4b40e41e
SHA2563ac46af51f438f21927049f96db54e3060b81606bc3c1acfae0e125ac5c530e8
SHA5125db406df1b09a4bc46c299deb653b949ab1dc6701977c5d964d1969333ea620585a5773ab3557ca87d19d18727e040a38285aca132828ff3491bb40a1dbee521
-
Filesize
5KB
MD51f74fef5d32eb67ed9bc3461b2e79d37
SHA1d63667fe4ecd109a2e5a53db1e45c0de7b044956
SHA256419fe31c2d5e299132f932a0bac86708d9ed45650e5096147998e117716b16f9
SHA512ac2f1bb3981a408d99ff84b5e345a974b8c2ae190ce5e9512bfe89e30546c2c582ed798c155f71b411a94ba0a68b091e05014257083c0e4d787a71d3cce152d3
-
Filesize
6KB
MD5680e0353cab03fe78e12df9341bc3698
SHA1bdb5721eaaca98e7fb8ff1b7afd74cdcfb4ad794
SHA256767dc35f4aa1a4f3f6d294d29a79c55b04b33621f846dd12f4bdb061fceeee83
SHA5126be1ca9f5b43a6056a0acc23baa26acc8ecd3b13e1d91fae9634534345ef47acb025e470ec270ddf43165db23cb6df69d75a8303a9ebeda276ab1d104a696803
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51e835d21d1376bfcfee5858478cb919c
SHA1d5edbdf36f3eb6f85b7f305774260aca7a22c01f
SHA256adad9b4bf48a833355a0b004b6ef4655b15315390cc823258377db3e94b4d1df
SHA51228cac3ada5efe4f81cd2359061c2a0e3c924eb507fad6e5716244e3220160848285c70eec064ae04f0f161d56a29b198139198ce89a986117bd267402a60c081