Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
austr.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
austr.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
cnrbtn.html
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
cnrbtn.html
Resource
win10v2004-20240709-en
General
-
Target
cnrbtn.html
-
Size
486B
-
MD5
9bdb72aa9fc6d9055f7200879091da77
-
SHA1
e338eb05cbab8865bd5296cdda8a5563d93dade9
-
SHA256
9f325e416171ea2b19f4b29e87f2b1e1361666fcd86d5e03a2a10d9826d29d99
-
SHA512
bd4fae43bc881314623fb735141e426dd7701aa411ae0fa302cc3b292a621f7b102ec565c1e2b085803cea70a1105c70c281df07930dbd4ce8b3c51aefed3e1d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 4952 msedge.exe 4952 msedge.exe 400 identity_helper.exe 400 identity_helper.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2428 4952 msedge.exe 82 PID 4952 wrote to memory of 2428 4952 msedge.exe 82 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3696 4952 msedge.exe 84 PID 4952 wrote to memory of 3900 4952 msedge.exe 85 PID 4952 wrote to memory of 3900 4952 msedge.exe 85 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86 PID 4952 wrote to memory of 728 4952 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cnrbtn.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff964aa46f8,0x7ff964aa4708,0x7ff964aa47182⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17629158767104712570,7349259020103784892,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
6KB
MD5cd7473aa814aac015cb6b3a7df1852fb
SHA1be0bec4dd5346530415b2c991561c959b3938668
SHA2561cdd9420d355f6e5cdf3dec6a79f5f202750927a9ef75240d617539ef1083534
SHA51287f75f6801f1f116e37388c4358203b41b638260d2289e587b720a93dca89fb4ce21bbebabf82d0b72199b9417e0238c762688bb947ce9c7b0f0f6b4599c7eba
-
Filesize
6KB
MD57f83ff239dbd8651aecaefe0febee8f7
SHA1ce84d6f2f8114c85f02e9d78e505b6b4c26df708
SHA256033f7515a618a2456621b06c31d76be3c7107a6a65fe67fd2dab6b06890e6983
SHA5129fa016877efe2c57a78a352b48d2afa6fa222695f62822edce2932f0f97e408cbb43c1a2b5eaa533bb613b4e44df068a1a3313666b2e4efab08adc3aeff9d7a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52e481ced19962a1bd1a074d90713385d
SHA1f30f35e2340f82f525bf673f283567d876e6eb9c
SHA2562b7d060e697df783dd38105009f2af95c9e6f7543347d3fbc1e75be10700a2aa
SHA512455da28ad621b29462fafc207164bfde74049501ca1e6433f8ef1f3f71011ea8baedc680ca02a35b099c0399c7508e823a8b3349351811a7e444bbe4e76e66cc