Overview
overview
1Static
static
1documentsh...x.html
windows7-x64
1documentsh...x.html
windows10-2004-x64
1documentsh...x.html
windows7-x64
1documentsh...x.html
windows10-2004-x64
1documentsh...r.html
windows7-x64
1documentsh...r.html
windows10-2004-x64
1documentsh...x.html
windows7-x64
1documentsh...x.html
windows10-2004-x64
1documentsh...x.html
windows7-x64
1documentsh...x.html
windows10-2004-x64
1documentsh...x.html
windows7-x64
1documentsh...x.html
windows10-2004-x64
1documentsh...x.html
windows7-x64
1documentsh...x.html
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
documentsharepdffile/aol/index.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
documentsharepdffile/aol/index.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
documentsharepdffile/google/index.html
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
documentsharepdffile/google/index.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
documentsharepdffile/google/phonever.html
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
documentsharepdffile/google/phonever.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
documentsharepdffile/index.html
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
documentsharepdffile/index.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
documentsharepdffile/office/index.html
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
documentsharepdffile/office/index.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
documentsharepdffile/webmail/index.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
documentsharepdffile/webmail/index.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
documentsharepdffile/yahoo/index.html
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
documentsharepdffile/yahoo/index.html
Resource
win10v2004-20240611-en
General
-
Target
documentsharepdffile/yahoo/index.html
-
Size
9KB
-
MD5
bfa3cf096cc3ee0c714235a57c4a3ac2
-
SHA1
a2292db7979d5475e6f179eadc9bdcba5cea388d
-
SHA256
5d81e581d102480f8c959d582c1cb4efb194fe43a7f2cc932318eceba2a40ad8
-
SHA512
fe3d657e83825ecdab71e5f12041d97f2a5d37f0d5beee6aee37cf95b3ff044fc6ad03940e31763aa87158154faa6f4690ac86944358920887c6093eb2738816
-
SSDEEP
192:HfzLHi82lyac7OGVF2dcem5mIBIZ0602o2KrxA62FR2toGfoBZ:/zTlwDmvofotnri
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 2648 msedge.exe 2648 msedge.exe 4604 identity_helper.exe 4604 identity_helper.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4852 2648 msedge.exe 81 PID 2648 wrote to memory of 4852 2648 msedge.exe 81 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 3408 2648 msedge.exe 82 PID 2648 wrote to memory of 4488 2648 msedge.exe 83 PID 2648 wrote to memory of 4488 2648 msedge.exe 83 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84 PID 2648 wrote to memory of 208 2648 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\documentsharepdffile\yahoo\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe4,0x100,0x104,0xd8,0x108,0x7ff928b546f8,0x7ff928b54708,0x7ff928b547182⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1496 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16086875788706943672,16344041730061461444,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD5bef87adfb4c0fb1f0a7e4fd2aa66c4af
SHA1320aed3ec00b7aa23e55fc793e690fe340b84113
SHA256cd8063b4ea48b6c88ec0ba5801a00436ad75c459988b0981f9a023135e12a03a
SHA512429d44099f8cc4d73b1728cd57c25a5655aefc462c6d51c6dce8e26d8c763222dd93a1b8791db42576415492a6774ab1f5cd9654d8ef1221e2fdc8ba2b01f187
-
Filesize
6KB
MD53e3b68a762085a6a340d00609c7fbbae
SHA1bcf360bdd8267c7acabf981369f8080fc9cc9c2b
SHA256177ad0bf1e10f037a16560bdd5fe4721bc5decb1f69b8b5a3d87583796a0b373
SHA5129906e1f188a2691d26896d7924547b3ce403fe1d9e8f8a5b62a9ce5e8ffc8fad9ec9a1605e580fca88687fcc6a15a8f34b81e871de77366168c6a35f727b42dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD584d77c304ec1aaeeb5c87a62b4cc5411
SHA11c143f8c97c053c10b792a38f505a4b32318c522
SHA2560732eb15451ee551ef3c8a411f6eaf2b7545a111e4458bca8b12cea7c4c0462f
SHA512e6f694e861e5da7ccee069738daaeeec3c67c08bf0a7289acca26757393698ac9c05d4a169f8dadcbeb6116909765715c043ab3e8c406f585b94913b307f031e