Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
file.html
Resource
win10v2004-20240704-en
General
-
Target
file.html
-
Size
312KB
-
MD5
c084316340ca0a88716593f809a9ce49
-
SHA1
4ac60d1554c461ab0e75465654bab13cf0958462
-
SHA256
a4eb1b20687b759f7f3d22d1d0b282da1e4802f766113eec05da6be58542155e
-
SHA512
a451d355273ad48cf13129c64ac2c5089aa9ff1fab0d2c40d1cbcd40875dbdbc3950e005f8497ad5bf78495c46144176c3b75161c998d37c32449b6aa4379a65
-
SSDEEP
3072:tiygAkHnjPIQ6KSEc/t1H+PaW+LN7DxRLlzglK4VSzk:7gAkHnjPIQBSEKePCN7jB4VSzk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 3332 msedge.exe 3332 msedge.exe 1740 identity_helper.exe 1740 identity_helper.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3332 wrote to memory of 3468 3332 msedge.exe 82 PID 3332 wrote to memory of 3468 3332 msedge.exe 82 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 2104 3332 msedge.exe 83 PID 3332 wrote to memory of 4708 3332 msedge.exe 84 PID 3332 wrote to memory of 4708 3332 msedge.exe 84 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85 PID 3332 wrote to memory of 2696 3332 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8da346f8,0x7ffb8da34708,0x7ffb8da347182⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1393169131068725896,2844507397568624320,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
Filesize
2KB
MD51199b654f3573b367bc27d2ce629e175
SHA114e146a42e5be50788e737238a4e04cf3fd1c1b3
SHA256691a60bb717ad1fdec6baf62dfcb612021e9b42448ab24d370b39682a0be8f5b
SHA5127f15f026294fe9feaaac894cf05ea9d89a08d859020c0c3f3dc53e3c3f2ed2f7ccfca12aef6b5c5e5f5b68ed68eb0b0b0795d31b444c4c09c2b0e83b4ff0fb92
-
Filesize
6KB
MD5617cc73a8d9a3fef53316ab647b72af0
SHA1b84bca14e1b1b442fff7bcd844b6c3d0ff11bf4d
SHA2568b62d044261c2611a057166c5d1687019170748d45cdc33d3ca9cd9e00dd6035
SHA51274075aea7004804e541f52985ce6acb3c155787b8a73d99a75a0d7824bdc14f27a76765576a22bb446f798b7fc66af066a7503745ff49e66937894984bc107bf
-
Filesize
6KB
MD5589e16d11d4b1729d0db15ce22ad9151
SHA13da3043e5045eb6a10fe44f54b61dc823dc959f3
SHA256fe5390b2943a8f0799e410b8c91efbe472bb782ff58673ef99669b1dea39f40e
SHA512574b4590a6d652c7bbfb437069e104a21e9f9889b4bc7eeb3c9bccbb25fa653aa400d5ddb83be030518a84acbd20bda891cb5435568480ac09a56db4e061b0d3
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5c167d10792689ec53a305309a5fceddf
SHA1809e89eff304893158417dc11ab5927e0371b97d
SHA256c431c91b90f3ab3a7bad4deb9b1585ab65b33df7a782df0090c90197a6cf1fc2
SHA512b81320d400077f88152c96b8500b4193b36ee4c06c24d92bd8b8fdcf06c853d55cbcbfebb66f859d31c54069adb089ff920659522b0eb418db9e57445f70c54b