Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240508-en
General
-
Target
.html
-
Size
4KB
-
MD5
8143a5d696a69f232cdddc6da75e51c1
-
SHA1
ada14f01b213c881ac4f89268fe9a728912cf33a
-
SHA256
99a19b55037821e43356fec21bc1c01e0684e4b3e8c59442fbd95ce79720cf88
-
SHA512
061f2c37144d9986090251041f44a1a859df65a06b17bcc102202309f2cf5667d8aa5e571c90cd9c3646fd950f3cdb56893458827b3e3efed04b5259e92ee204
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8jZqXKHvpIkdNxrRU9PaQxJbGD:1j9jhjYj9K/Vo+nwaHvFdNxry9ieJGD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 1884 msedge.exe 1884 msedge.exe 536 identity_helper.exe 536 identity_helper.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3260 1884 msedge.exe 81 PID 1884 wrote to memory of 3260 1884 msedge.exe 81 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 876 1884 msedge.exe 82 PID 1884 wrote to memory of 4688 1884 msedge.exe 83 PID 1884 wrote to memory of 4688 1884 msedge.exe 83 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84 PID 1884 wrote to memory of 752 1884 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 /prefetch:82⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,18256227771444495207,7570275321619204630,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD59f0989109ae6db6487cd8e2310af477b
SHA183465be45fecc5c2eb786b62dc99d81b195b4225
SHA25620517ab1f57d05b475ee94cdcdfbbc258375f4188a401478e4f5ac8bad01f57e
SHA5129077db52a567d092ea47398d081a262693cf684b6e0a051d04a2f3f480b4f4df55df0baa6f29eca67e2d8e2ef11466708be8755df9dcb4ccb67fc8b2b5476741
-
Filesize
6KB
MD570f193add84271fb5dbae8f68231855c
SHA15687dc1eb47b1b39abbeec0f9cd90fb5e04dc9eb
SHA256e5ac72fadaac7536361067300d071d48c6082e7cb0c70f25c94693daa9e74bcc
SHA51205557f7da6fe44d776ac209f72c0c35afc649a60b1c352f198c704a27cba0168976b1386ddccbd7d716fa8d95e8ab7068f89bda19399cca2d9886ba986a8e8a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5f2114a6b301a5cc81e92c3f1cd5cfd60
SHA1404b2939f686e8f9a52e7fed6c530a0dd7cf1eae
SHA256bbd0b4a019734b17d6dae9a108c175bde00fa9acca58461e3667024588b5311c
SHA512fc3025231f5af5ad4e1990d9f86e7ee0c53d3e506b885cdad4cb37d35ab926fc249ff77311bae0f264d4c64008b256235f24645653a323efd4457dc214cc59e4