Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 23:39
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
55KB
-
MD5
c696299c8cd188c50967a685bb7e1d51
-
SHA1
ed3a1c56b991edd3e33cb0238df77eeddf4b462c
-
SHA256
05e07d7fadcea9f2be033eb0b9bf91242c1ad3487167192bfbb798a7f7d17506
-
SHA512
a69a086a3cf804c48986f2e36c3c28656d6d58f31f3ac6e2ee27ccf4596c9878116d8f51345532e78d11b89f367a187c0ea68b1610cf51fffb5cfbfba8e577cd
-
SSDEEP
768:STGXITBrNLzc9BA3ahZok4UJMbtl4dmId10UfMjq5W5NxGhaqSjpMd:STGXITRxzc9BA3aIWO4dm8nfIlMd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 2080 msedge.exe 2080 msedge.exe 2436 identity_helper.exe 2436 identity_helper.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4652 2080 msedge.exe 80 PID 2080 wrote to memory of 4652 2080 msedge.exe 80 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 64 2080 msedge.exe 81 PID 2080 wrote to memory of 1552 2080 msedge.exe 82 PID 2080 wrote to memory of 1552 2080 msedge.exe 82 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83 PID 2080 wrote to memory of 1900 2080 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab54046f8,0x7ffab5404708,0x7ffab54047182⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1912 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:5704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16960705148718606475,18060901226438044518,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD527925eccb38a9fdc901e3c928a50093e
SHA11b4834b7022a49916b59b29cd08e09ffa3637791
SHA256c2799952c2c2387ba06ffb5cc3b4bfae33c538e94ab7798c405e513a5cc5e029
SHA512ecfa3046ebc212b982071fbca2531b45be934d835639012f812fec58c360cbcebc3c81cac1f5540a34dfac731a612df19e06c83f2a710b1004156fdba0e4ddc0
-
Filesize
1KB
MD5666b179d6bd63a9da5bf276085552914
SHA19422db752bc61fdf635e081b19b128b7739314d7
SHA25696e173bda340c37041418295339cc56390fb604eb6f07ddff6cc7d18594336be
SHA512c85dac9d9f8fdb99875712566bc27d6c90791df24d97b8dbc54f6844fff5f78ed855151f30b1b9584cc3b3137e89f41807c0d51f3db430ddff6ccf3f2a72c5f8
-
Filesize
5KB
MD564536db0349c7946a9061183267f4819
SHA1805a9e1802598c1575147b6de2b0ae0feb1feeea
SHA256144c95a4fe2aad5a9727fced0776dc0f8973fb24152da5b3318e1edc6ef3b54c
SHA512824e834a3552f1fa4ca00b8fb6249b47de823c8ae89c9b83c1ad5c27691e85b3b8bbe8915696fc8bb4ac161350f2d0114dd05bf148d48e1d47cb7b26f8a1d193
-
Filesize
7KB
MD530f2ce9186da31d38ce43ebce8641b7d
SHA10b86c9999c25d2935b06bb2df178a75dda0cadda
SHA256007e59a9e6dd9c58d17c67d62109645e2f0280cd5484c0d09f27218c727e21b5
SHA5125e5f96397fdf9ea0b1f1f69a985eaa75da45520f68bbf773b4b69a5b439e9eb144da5000cedae0b5cce5666c8cd12e7bc093443fc10f572aabd3755876011f2c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD516e2994d2eb22677f57a79a9c94f6798
SHA1d9d0f214974242f11a2231c8892abdff5458000e
SHA25668f2edd9e5b168d57654b628903a7dedb6b94f1b30b8fd2032f3dd54e95c63a9
SHA512e812ee60c26dad6815a0a8020174eb454c1696dcc61aadb2599b12d0c4168af913d820370c5e9b7cbaa27c7cdd9497578170e5fcf2a6be0829fa2f72e19cd222