Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240611-en
General
-
Target
sample.html
-
Size
218KB
-
MD5
bb2a6faafc2dbd49403cc9bfc1248d22
-
SHA1
5217963276bce38e7c970b7d22c1ae1690bc4edb
-
SHA256
79ac30eb0224395b931b7bf1a9aadac8189b0bc348d8dae0c1aea2adb43cc48f
-
SHA512
b3dcd329ede1a21d6278f62dd0940bca315619e823a9a032e099201bfab49627648e994f5946337295b80275430675bdab2ad2fd3bcf8b004075cdad5cba7679
-
SSDEEP
3072:SXlJXMGU742VbKxyfkMY+BES09JXAnyrZalI+YQ:SXlqGn2k0sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 228 msedge.exe 228 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 228 msedge.exe 228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 1820 228 msedge.exe 82 PID 228 wrote to memory of 1820 228 msedge.exe 82 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 2996 228 msedge.exe 83 PID 228 wrote to memory of 3976 228 msedge.exe 84 PID 228 wrote to memory of 3976 228 msedge.exe 84 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85 PID 228 wrote to memory of 3924 228 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc80da46f8,0x7ffc80da4708,0x7ffc80da47182⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,672048108577193604,3460623025271160333,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,672048108577193604,3460623025271160333,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,672048108577193604,3460623025271160333,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,672048108577193604,3460623025271160333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,672048108577193604,3460623025271160333,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,672048108577193604,3460623025271160333,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
6KB
MD5858886856cca263823d1c6632f8c2134
SHA1f52425bdd11c2e69c9048b9fad8aac7a45ae42ca
SHA2561e56c33f48ed20ade28aced448550ddee1d96eeec98b2b9206fb223e54a214e5
SHA51244483029880eb86648d100a968096cb991670328c2ca1372656e78047b5b6b3a10ab80f2aa95d12c09f1c05f01118effa13fa9e8a895a0b20acb5847878aff22
-
Filesize
6KB
MD5b8dc3a59f5ae097f03f76657cddd0bb2
SHA1dfa469697fcdcf98d4b126f8983d31f4501a3fb5
SHA25655cba347511e6124b4b3336857ff96f9276f75016298ff3d9164cd905f2934b3
SHA5129126fbc118bb3faa561e06878ee9bd2d6a60426b6898a44507e1a9cdc0f4b6a9bb03a83faf62da5da7e6f49329e22527b2a96ae705783df742bbfc1a316afa68
-
Filesize
11KB
MD58a88cc024ced1d5aea13d253951d4698
SHA1fa42a4e56146bcae4ad6d59bdce9736de66c8c5c
SHA256330a40924b9e3204ad168ad064a3d9b3440a69480c734692aa1dc9285a3e10e6
SHA512386e5202e2e4cd7a372652f7e83bc5f8438efac64559a07107da91ec24f7eca64a57f87ed7bd73f0abdf109d50ddc389645263957205f2a44eca43b6b8cfc29a