Analysis
-
max time kernel
112s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 03:29
Static task
static1
Behavioral task
behavioral1
Sample
3cd0ec473974331fc776affc15b43730N.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3cd0ec473974331fc776affc15b43730N.html
Resource
win10v2004-20240709-en
General
-
Target
3cd0ec473974331fc776affc15b43730N.html
-
Size
21KB
-
MD5
3cd0ec473974331fc776affc15b43730
-
SHA1
e07f498b4ec2dca49c6ca39f274a3b62595b7acf
-
SHA256
7284ebb793b0c49354b44fea3d7331409aa9c69723131b449527959628e7921d
-
SHA512
9ed3d970b131e05c5e45e1dad413e31f3cf1c4cb9625389dd48a51ebe1d0d60ed9422c599af459a68d5b315e0bdcd30d1aebfa5018ac9a3534cb12cc898514c4
-
SSDEEP
384:QfRIjUDGO2G9kLL9jl+dVchhEldJ11vFlFt9kitZbRJgR5MKxvPH83hdCj7A0ZWX:QfRIjUDGO2G9kLL9jl+dVcmh4e4RWKx4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1876 msedge.exe 1876 msedge.exe 2184 msedge.exe 2184 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 892 2184 msedge.exe 83 PID 2184 wrote to memory of 892 2184 msedge.exe 83 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1048 2184 msedge.exe 84 PID 2184 wrote to memory of 1876 2184 msedge.exe 85 PID 2184 wrote to memory of 1876 2184 msedge.exe 85 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86 PID 2184 wrote to memory of 4932 2184 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cd0ec473974331fc776affc15b43730N.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff964aa46f8,0x7ff964aa4708,0x7ff964aa47182⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9265206272457455804,10101723234342174874,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5e73388f305f28cf1a343eb48d645420c
SHA139817696e13cbf9027431ee649e68eb2d2f291e6
SHA2562060bbe78190829743d93d058684294b61253588f70b07fc138f84c6cd78cb6f
SHA5126e846dff59649502eec0dd30ecd5696faaba6cd6143de30e18fb34e632b22597629a5426122a40cf4597e957fb35a4c3ab4adb6d6287b4d286761a4b51abc0ac
-
Filesize
576B
MD5a4edefa3f3e2c085674fecbd42532bcd
SHA1b88680b1f8545e943bdd609c4619e28cbeb26d80
SHA256894125731794a52c4b86205ae0b4f30be0fa0eb2c56e08dd1d09837e0c09b2c4
SHA5121b3f6a60362476c804b8aa7dcf033c3faabc525eee794881b5c18fb0cf0bb035b53029b6041b3794b7e22d63baf0bec421726c808e5e7853b0f8dd88ccf6b1f3
-
Filesize
6KB
MD5dbabd53a701f8086d222ed5501e12f09
SHA16e8dc8f40c0c4edc877a940dfad503f2aa5233e4
SHA256d9bb1801c61157be920ff38f0b668ac93c97c4f28d0b39b5fd250d3168468904
SHA512d8c086f203d646fd7a894c17ffc05db1a20a73d9b917b9cd0455420f177202fd8b5f8089880949d31567a88246dcf0b1f900cb5128a47f6335c374e18f99604f
-
Filesize
6KB
MD533ed829335f82cb0206707c77f968a8e
SHA10508d21a838c779f9c78af7fd6c2f7eca5802c99
SHA256fa72b5dfb9989ac6bd397743ff3074e4b456aec1b0ce6db5ed927260e304f45c
SHA512d0a3abbdf96899f6381f8bfd68c7b3de1b13b6d0f37f15e6fb1e7c1c1d7c7b69e9eb08f5f48ff53e3ccc5501ca2b937e08c96888892d76caf3348f5a6e10414e
-
Filesize
6KB
MD56afad67836c4a74700b3bc3865eb63a9
SHA19fb5f184b594b5e9577b428b4dcfa19b1f55a010
SHA25608df5006b8301a7ed479a5506dbed51321b02abad1991df593ca357dea0d3daf
SHA5124bd49033e9f6f2bab4f21f054c3caa26c69c0d633d94ed4a9950baef17ac485d6420bad6cd1ee56ab849dc2bb1f91fe0facd646d1e42ff80ffeff044e5128d3d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d5b264a077e4e3f3e7ff47568d568e4c
SHA1ea6f1e9d55e6b956dbe63906cd491d2e493b4679
SHA2561f802373dd0269902e9a5e0cca022953fddb21a07ad3fe4e8860db9a867338ae
SHA5120b13066d4c7b7e0939106db5ccd81f9a0be0cec46a1239eb55852d0c39e3e4d6b7cf768a23db197c1c7e690a48e4581074b0ffa4c8b4a183abb7e5e57adbf2ec