Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240611-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
318eb9f0d0787da1c3f0c16616a8207a
-
SHA1
4e0722426151fe32210a765bba1d4b46c5487168
-
SHA256
78037f3e185db29d6b24d199e5ef134c8e632ee93692658f8f1e5abb2771e19e
-
SHA512
f117e9a2118eb6768b20ba5d8df4f09b56d3e9f0737461b3663fc698a9e74e9bbe737b75e2dbeb789aa10e89d1f0c549cde464ba226accd66c5cc05c388576f4
-
SSDEEP
3072:SP3BW1oySoR0eyfkMY+BES09JXAnyrZalI+YQ:SP6e7sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 4668 msedge.exe 4668 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1688 4668 msedge.exe 81 PID 4668 wrote to memory of 1688 4668 msedge.exe 81 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 608 4668 msedge.exe 82 PID 4668 wrote to memory of 3256 4668 msedge.exe 83 PID 4668 wrote to memory of 3256 4668 msedge.exe 83 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84 PID 4668 wrote to memory of 1180 4668 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf84646f8,0x7ffdf8464708,0x7ffdf84647182⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11402589241998470898,5416119370590337365,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11402589241998470898,5416119370590337365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11402589241998470898,5416119370590337365,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11402589241998470898,5416119370590337365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11402589241998470898,5416119370590337365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11402589241998470898,5416119370590337365,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD5ee4e4462813c61d5260568caa625c987
SHA1d6550dbe4f167a8a3feb1ec5e5dc7bdc3c8a1c68
SHA25640a8b2033f002ad10a2fd865d74bd6f9592d38a2b24262bcfb108beb3fd3f588
SHA5120e09512a957c8718b541ad0dd45e684276a4cfabd77bb04676e6940c39be5654cb0ef53c189dbb3ab4370aaee8caf171056f8ceb87774cab5a88014443cd59c2
-
Filesize
6KB
MD56e788110c602d530b1abce8c93fec1c9
SHA1b4e071e5b664b69d66d6263d22d9455671647e0e
SHA2560b962f5917cf9ae2dc625bd42db94c15ce129a4678c2991d28e324cc2db4e306
SHA512ed1c28e931a1231756c637e7c00d9634b407ae4e204c2adf5e85d79683b86f190cf0ed10052033d28a32bce60125685894285951bacd566e80f702b3014ff18c
-
Filesize
11KB
MD5fc8661da5cc8db77fd701374220c73c5
SHA1794dbfd338557233f84fac8df9dee4cb681d90ea
SHA2564893d88af51a6191391e761c1af18a3119df4486e7486d45c66200c60cb5c192
SHA512ac0bbfc7eea6161d524a795001357b7ee62e753322dece6f357429bdcd1f291736c5520c9cadbe45e5ff6ffa0cc87374112ff18e77090d8c7860d5608c938d21