Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
voicerecording for Nicole.dee N810.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
voicerecording for Nicole.dee N810.html
Resource
win10v2004-20240611-en
General
-
Target
voicerecording for Nicole.dee N810.html
-
Size
8KB
-
MD5
23088628865768a274b56da3ffc2da27
-
SHA1
7e2e1b1b7859be9fb2bfcf89e119ea2bc8130d79
-
SHA256
7989777116f8111b51bab7baaea07aabdf318db421cce88a04a0a4f03a7f675f
-
SHA512
9113ac449a9818c1aa7a389db4252844752a07cdc368173fadafd93e509c10182f4ebf0726fbe8503a065b33d1199a170a10fce40b982fcf2610e18117672acd
-
SSDEEP
192:tNJcBJhW5A6NsNZHdc4n0INqD/hswzK+wNvXYRK+qfsw+RAc:DurWCGQbN0cvskEwip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 3640 msedge.exe 3640 msedge.exe 2788 identity_helper.exe 2788 identity_helper.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3640 wrote to memory of 748 3640 msedge.exe 83 PID 3640 wrote to memory of 748 3640 msedge.exe 83 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 1840 3640 msedge.exe 85 PID 3640 wrote to memory of 1840 3640 msedge.exe 85 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86 PID 3640 wrote to memory of 5076 3640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\voicerecording for Nicole.dee N810.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa974146f8,0x7ffa97414708,0x7ffa974147182⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,17600476130056610568,11265984487615112813,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD54680ccbc2e148b83e924fcb5ff07f1f5
SHA1ef247b3d8feafc853da51272b38ce5b58fb05222
SHA25622bc50b57e10cf9b8d6f1579ffa2c96b0b416484f3c4aad7866b017f823bc320
SHA512c6ff84e135d7d84ee443583f69b70468471f789bfd31ba70ba1163ba672add8842d02370b4d6ba48052ee2482ffd8e2d8791d40378c29970aa31e72ed75830b1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
355B
MD51e99492cb607bcf2dea53813ee543ca1
SHA17388f0b3250c388d0471a54a9b4fb741ca612840
SHA25650e388a4a12e7e1a19a34edbb35ceba7ad9d34bf9c70be1e609bd16d9f8d9601
SHA5126bce80ac5a92b6ab6a4e5ee0be7852d4021882b1334cb476508f4f778251bfe753668bffd081cbcade4e37444a9fc3b14bbfb5c97cb8d95e799cb05733b5b4c4
-
Filesize
6KB
MD50026d10f3a1e193d123185b97e17482c
SHA1db2fd5707f918fd4f01dac4642e3ffe2736df155
SHA2566e386e1dbd0cd8c5168fd048b2296e2ba39a0ac5091b97a269ab536d96a0c1e2
SHA5120ec7d17e6add1b5ed78bb88b9167ad8e45782b46300f38c63890a926ba37c27ac126e2431c1d3d9bc08c7f34a83d05ab798303b6a99bc9407bb9d09b4879c822
-
Filesize
6KB
MD5cb63e16ad336a1515241f0266c45b323
SHA19af233d14618e32ce55ea675f7a34e0a4b4ecf7f
SHA25694962a36786de4d53741ec4c3415dbdc5f8911a051f3f1d35c1de9b0037c6c18
SHA5128349d4321598508b44fa06e91972d1240e386fa62ef4852b8a8e44b870c2c1561ffa57b013802fe4343f1e89cd80d9c5dfb927ac9d23824a1e6ee49dbf6a1e40
-
Filesize
537B
MD57760fe5e8fa44ec992440d8ea4f46c1b
SHA170d2a11a92e5e455b80bf7c33b15ec594857af15
SHA2569a4c0739cba32e688432e5565e3163e63408d36a2b69eeee812b33f7baa9d6fd
SHA512ca70699c3b3b80e76a9077648ba1f79ad3afa58590a271d5c16d5403163e27e3233a1fb52868abb4eca704f0239e49f27a08bc0240e6d9676114abf89c1a9556
-
Filesize
537B
MD530de64bc84cbbf80bb07b8ec408a8093
SHA14e3584e923e893ad1a520d288fbaf6aeba9df121
SHA2569076e4aa69aa2373e5398b81b28862c19b8deab5f0e1fd794efde5000033c8c4
SHA512dff5f12e194adf827954b2eb9c5c48aa3ff98e859624f4d1eebd4354815eab3b4093377c66d5fab8dc00a7586f0de6b6e6235eb7fb184409b9a61087766cc43d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c319bba5fefd57c56980348e685feb45
SHA1142eaf3d1f61b95663f78609ba03e2061bca8133
SHA25660337006de4ba216067e61021076baed46d1bbef0df460f3c0ca000444615716
SHA5129864454630ddf42f383b878921060566ccb9bc5b0bd131dacf96827949a1ec5f6adec550f97ef33d2b557652d4cd850413615bc29d8dbf7bb68c01a95c3b410d