Resubmissions
10-07-2024 05:27
240710-f5fcns1drd 110-07-2024 05:21
240710-f1y9zsyenl 610-07-2024 05:14
240710-fxefea1alc 7Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240709-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
0811df58bccad6d4a6dd029c85c8fdca
-
SHA1
de6c8ed386cb0661fff00bed66f790a51ef2274e
-
SHA256
2910fc13fd3da3aa87f1320519b9ed7184c026fa5213c9a0d95c5578d577ee28
-
SHA512
2ee686f247ed20a38cfeb941598028cc9d5956c674c9f9619e30acef3b4a25a5f77d0ded36e9f69779e21534c45492dcf64ee969cadff805a809a1ec3c935920
-
SSDEEP
384:yJc1spY1ocy4w4lbGaTsvhpNYTW9Mkp1S2m0Y3Y06Ib3afl1xCejiw:/B1ocy4fEaQJpN2Wykp3Y3Y06O3ADxPF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 512 msedge.exe 512 msedge.exe 4212 msedge.exe 4212 msedge.exe 2660 identity_helper.exe 2660 identity_helper.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1368 4212 msedge.exe 81 PID 4212 wrote to memory of 1368 4212 msedge.exe 81 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 1440 4212 msedge.exe 82 PID 4212 wrote to memory of 512 4212 msedge.exe 83 PID 4212 wrote to memory of 512 4212 msedge.exe 83 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84 PID 4212 wrote to memory of 4872 4212 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9733f46f8,0x7ff9733f4708,0x7ff9733f47182⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4118734010705724325,15099184525179806002,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0dfffcb2-eeb5-4098-99c5-e77115d1f5dd.tmp
Filesize6KB
MD59b0afce86d4e73b6b9970ce0d619633f
SHA17d90b9ccee6b0f1ba57c58293856b525877878bf
SHA2561d0ecaf2084b2f78bb2e875d66b232f30d07636c57318cfd362785ace713414a
SHA51206fb290a1adb4abd021349c2c853b3d3e8a97383979075b379269427c005a87be1326527068508ba29c26010d876c5151066173b47dc70bf094fe102fd4c3535
-
Filesize
6KB
MD532ad938842f69371c6edb0426b98667f
SHA178d8ae7f3f94e10bbd0de996bb1f9d119dce8036
SHA2560805330cab268607c2588925d3cce95a28cd1c7f17ef7a0738b7c9964e6cbaa8
SHA5127aa3c837d844d145e96538648cc843b90610fbe66fe47cb310502eb717e355b204099cd2187255c110115dcf175b999cf77e89b6f0a13f062583de73a184d372
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD560095c7e5cc721df54a34f26e9f64ed9
SHA16f1953fd1184313eed03d39f808be14822df018b
SHA2565f2af7f70743b59a9205f6757199aa07c0d00fde85964b0476361199914d26ad
SHA5125467c5ed1acedf927de23accea96d6cce8fd0ed8c7ced4a02e89b8f01e78c25a3aaef402d24345afafe1304a622716e648f40119110f1fe4d6fb1f620cd24916