Overview
overview
7Static
static
101-HTML-fi...5.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...1.html
windows10-2004-x64
101-HTML-fi...9.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
101-HTML-fi...3.html
windows10-2004-x64
101-HTML-fi...9.html
windows10-2004-x64
101-HTML-fi...0.html
windows10-2004-x64
101-HTML-fi...4.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
102-downloa...ok.hta
windows10-2004-x64
703-malware...t3.exe
windows10-2004-x64
303-malware...t3.exe
windows10-2004-x64
3Autoit3.exe
windows10-2004-x64
303-malware...hF.lnk
windows10-2004-x64
32024-05-14...ty.ps1
windows10-2004-x64
3Resubmissions
01-06-2024 21:09
240601-zzxvbafa7v 7Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
01-HTML-files-13-examples/May_119275.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
01-HTML-files-13-examples/May_234892.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
01-HTML-files-13-examples/May_299872.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
01-HTML-files-13-examples/May_328152.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
01-HTML-files-13-examples/May_436171.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
01-HTML-files-13-examples/May_446619.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
01-HTML-files-13-examples/May_447386.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
01-HTML-files-13-examples/May_554063.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
01-HTML-files-13-examples/May_583479.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
01-HTML-files-13-examples/May_654380.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
01-HTML-files-13-examples/May_673434.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
01-HTML-files-13-examples/May_765966.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
01-HTML-files-13-examples/May_787116.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
02-downloaded-HTA-file/ok.hta
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
03-malware-and-artifacts-from-an-infected-host/C__ProgramData_febabbh/Autoit3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
03-malware-and-artifacts-from-an-infected-host/C__nkll/Autoit3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Autoit3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
03-malware-and-artifacts-from-an-infected-host/StartMenu_Startup_Folder_Shortcut_CecBBhF.lnk
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
2024-05-14-IOCs-for-DarkGate-activity.ps1
Resource
win10v2004-20240426-en
General
-
Target
01-HTML-files-13-examples/May_583479.html
-
Size
61KB
-
MD5
62a102ed05018fdfe266452f68fca782
-
SHA1
37a64a6549ae601803873b4a0543129fba075c88
-
SHA256
107994ddca0ed2b774041c076b699df4f34d2fbdca11539404571cb133d41554
-
SHA512
d235c6d105e4ff8f9743668224d9e13ddde6895c3d143ac6cb3eb1485bb3f3ce8409c8a4ff1c9186397dbb156f56104046f8c8b4bcea228b33e71e848f28512d
-
SSDEEP
1536:UzxuJKxK7kdK2FlBNt0kLENLOZ3m/AgH5dyM:Uzxu6xdK2F//B04m/AgH3yM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 312 msedge.exe 312 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 312 wrote to memory of 1936 312 msedge.exe 83 PID 312 wrote to memory of 1936 312 msedge.exe 83 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 464 312 msedge.exe 84 PID 312 wrote to memory of 3928 312 msedge.exe 85 PID 312 wrote to memory of 3928 312 msedge.exe 85 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86 PID 312 wrote to memory of 2568 312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\01-HTML-files-13-examples\May_583479.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc284846f8,0x7ffc28484708,0x7ffc284847182⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,18231272230956718348,13293341606417695084,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\484c2302-2668-4394-b370-edc908d9b87f.tmp
Filesize6KB
MD50ebc91a5afbde19dcc5a33eb74de2e67
SHA17b7fd33300a03bc7c54e8a685cd55724753ab532
SHA256159f9b14aa128dffed8f8b21db5149e3dabbd04de7ccfc899bcc0a8ee8a7161b
SHA51239153ca51a0656ecb3486e48777bff345a0303e8da82f2941c4c8702974316f3d27c58c9307bdcfd4f61aea726a1c251ab1478e9cfc3bdcf6058f4cacdac0a0a
-
Filesize
183B
MD59e1275231d0007b3a42906cdadb34ea6
SHA1de552221fd88afa25f6cdeceed2c825d4b40e41e
SHA2563ac46af51f438f21927049f96db54e3060b81606bc3c1acfae0e125ac5c530e8
SHA5125db406df1b09a4bc46c299deb653b949ab1dc6701977c5d964d1969333ea620585a5773ab3557ca87d19d18727e040a38285aca132828ff3491bb40a1dbee521
-
Filesize
5KB
MD5930d5861df06e3573f3b61b0f45b7150
SHA135373b9af3a8c7bbdbfb3c9a2231c6911b200c53
SHA25699b5c601417967a14d65e3cf63b4cfbd6ef8d60dba1282edb77dcadd75692c68
SHA51294f2423cf2e4cd809c58334920be01d56d8128fbdbc00c84b98d943146107f52eeb81f17b326af2f191f644fe3c0aac3aa8d4c885dc73d69bed350d722532553
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5957c9e321549a88a1629bebd6c770c9a
SHA145168d28c4c5a41254fb3cb3bcd12c6a5ae733f0
SHA2566f9fb2ffa4ae7c0c3583c4a8c765c8f001db851a3d48e693d4b186ab086d9a4f
SHA5129ad704e940d81d50001d4bb83d060fd63a3ac1b0108ffda05fd1ce02880eed8c96b40b1ecf29f5d777ffa3802dd3e2171078708e88b389099d687cf0efe5f78d