Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 14:02
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
e702f4e1e02f2a684d9e63b99f03342a
-
SHA1
ec9129c468d9e1420da467f219358fa79ca79c90
-
SHA256
1770c1362842209b3a76c517fcf0ed903cbde2dc29a139ed00219753f22698f1
-
SHA512
310c656d7ea11dda0de6e8972628adbbbbea466a1b2bed28d5533639b80ef638aa5ff88810262ff00f8af69505fb7ecd8df3b7bb75f477ad1288376c0b231f91
-
SSDEEP
384:cD4XYspY1ocy4r4lbGawBvhpN4c2gdK2fa2hOwV0b06fQfNxCqcR1:Kv1ocy4EEaMJpNx2p2hOwSb0gyxQR1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 4220 msedge.exe 4220 msedge.exe 220 identity_helper.exe 220 identity_helper.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3032 4220 msedge.exe 83 PID 4220 wrote to memory of 3032 4220 msedge.exe 83 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 1400 4220 msedge.exe 84 PID 4220 wrote to memory of 4216 4220 msedge.exe 85 PID 4220 wrote to memory of 4216 4220 msedge.exe 85 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86 PID 4220 wrote to memory of 2616 4220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa292946f8,0x7ffa29294708,0x7ffa292947182⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13576349006643622496,10718235610790711754,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\24571ef6-63d5-494a-ab3f-92c4ca361ec6.tmp
Filesize5KB
MD511c1ef9858a89181641253cf1bcc4ebe
SHA12db1d73b3e779af603703276002e8b325a059616
SHA256e848376f6af2c03355c4126fb73df991accfde78780bbbdf99243787de71ff6d
SHA51230920c6226b90e218fbffa5d7df8eff2a6d22c998b354c15b5487406606341138a4e93b213f364c2467a0d7f6acaa227987b509d3131722c4197cd580c3e68e9
-
Filesize
6KB
MD5463ef14d9be91cc216a1fde54856df48
SHA186fddd8595baa57102b61602dde931a02974fd94
SHA25640762c0199154762185b4a8c575780ade2e86fc7c9b0cc5be689f190ad7098e0
SHA5122844482a3393195443c43f1ff93ec18abcb7788d9e192c6e59c874a45c5e68fca0b89b5c52a6457b2df386d1cecb76855cd338cbba1f7e5ef79efcdc94686377
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a8d6ec8c8006a944a3609d84d0710256
SHA18d4a5c108de62744c96da65e8ce8c5ba0fbdbd19
SHA2566d132d8f52a67962a4edc359326876da64a6425e90e54c0205ede2351048f926
SHA512bb5d01d3353dbe02c3938690329f43be84ef2a1b27567add1eed439a8c2e6e1758f01da450353df4834a5e28a592db3b21326ddc4c42e085024ea5b0a44570ce