Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240611-en
General
-
Target
sample.html
-
Size
220KB
-
MD5
56ea2854f4830b21b0c1de4b6d459850
-
SHA1
b4197bd7937f3b1d7d312e40be4ae821c22a1b4d
-
SHA256
4812ef4d643f7a7a59dd871d47de6ad4efdbbfd98f77852b0669f21c5ce75cad
-
SHA512
fed469d295a938ef920e12700f1d447def831774d32ffcb8ca0aea0bcad5fb7109c4d2894217fbca7f5816a1261f05eca4ab6d1465203fd0f82800d9fb303e54
-
SSDEEP
3072:S4mxFa9z1IstyfkMY+BES09JXAnyrZalI+YQ:S4vYZsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 988 msedge.exe 988 msedge.exe 608 msedge.exe 608 msedge.exe 608 msedge.exe 608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 988 msedge.exe 988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe 988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 988 wrote to memory of 100 988 msedge.exe 81 PID 988 wrote to memory of 100 988 msedge.exe 81 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 3228 988 msedge.exe 82 PID 988 wrote to memory of 2664 988 msedge.exe 83 PID 988 wrote to memory of 2664 988 msedge.exe 83 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84 PID 988 wrote to memory of 3976 988 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9671846f8,0x7ff967184708,0x7ff9671847182⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15164877293913310863,6408820253556527931,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15164877293913310863,6408820253556527931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15164877293913310863,6408820253556527931,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15164877293913310863,6408820253556527931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15164877293913310863,6408820253556527931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15164877293913310863,6408820253556527931,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
6KB
MD516fbba6d5753a5aa9020b95881a80537
SHA109d7c16c7a6cb953c4333985e1629fc129db21c6
SHA25681ac10091b687d45bd5ec567151e9e45052f62913f4753432183d01dea53bfcd
SHA512880bb1f81a5e091f14cd7247f55d20ac33c7d429158494ca90cbf2d2d06ba6ff3636b1ed9815e8ed5cf26df542b8676e53e642ce201fcdf48e05fbb93aab653f
-
Filesize
6KB
MD536f968e7d9067c190d40537e7e3cf7e5
SHA1e6a17243ecf6a153966d05ab0d3b7ea37a69bdd8
SHA25666bab5536ef187a91200ba3e9b39c8b94fedd82861edc506a1e0e83ffefb4e76
SHA51294edf9743cbba0215b90b43e343c91900fb3078bd2a1e201eb149213c7d830141de7c79ab137f8f19f118d0ac7944f71f1825a4ab4bf20620eb60356bdb0f037
-
Filesize
11KB
MD597d25082bbe39605490bebbca70407f5
SHA1520dcd030ec9b4b985df11d61a84ae466e61f143
SHA25622be9f42e65ad405276158256c50d18a81729e5dc10eac5151b82f821320a2df
SHA512d07812c5a673ebd2de2b7a065b4b1e40e25cd28bb4625f4f9827c4959153b0d924be7f3ae31d5577d8dbdf9ace5ec5ac2af017e83e625cae1904c222d6e4335f