Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-07-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
new-cons.html
Resource
win11-20240709-en
General
-
Target
new-cons.html
-
Size
4KB
-
MD5
b40d9d97547f5e301e7e193ccd18d30e
-
SHA1
71313c1e80cb6b1ead1c1ce537a098e60ce12a84
-
SHA256
cfe9e920c6172b5b25fcac3b5efdc1622f8ee78a3af8d890ccd92eb68b911dea
-
SHA512
83d1b55d9d2c8e9b98ba2b1a90f533b7784253f002b67a57b57b5f1dbe2ac109e6da8c612f325f891a4e4ed4a060d6e5a85e91f58163a1823277d44e4fba44c6
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8/ZqXKHvpIkdNprRU9PaQxJbGD:1j9jhjYj9K/Vo+n8aHvFdNpry9ieJGD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 4684 msedge.exe 4684 msedge.exe 1744 msedge.exe 1744 msedge.exe 2748 identity_helper.exe 2748 identity_helper.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3456 4684 msedge.exe 81 PID 4684 wrote to memory of 3456 4684 msedge.exe 81 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 3652 4684 msedge.exe 82 PID 4684 wrote to memory of 1384 4684 msedge.exe 83 PID 4684 wrote to memory of 1384 4684 msedge.exe 83 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84 PID 4684 wrote to memory of 4356 4684 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\new-cons.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa658a3cb8,0x7ffa658a3cc8,0x7ffa658a3cd82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2492 /prefetch:82⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,4029324902150509453,17561697338330872757,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54656c526f71d2c1122865ef7c6af3ff5
SHA161684265064c225f323d304931ff7764f5700ac2
SHA2567172417b8464d5c2f52edfc867f4d83e475b58fd316b1916cdde30ed5bdde80e
SHA512c3e4fc0baa216ef561a448e42378af01a50e0ebd9b5fe554c9af0ea3362b9ca2f4a1b99cfab66c18df085250dd7a5ca1b01ab256e28156d657c579f5518aa56a
-
Filesize
152B
MD5bc5eae38782879246edf98418132e890
SHA146aa7cc473f743c270ed2dc21841ddc6fc468c30
SHA256b9dd7185c7678a25210a40f5a8cac3d048f7774042d93380bbbd1abb94d810d7
SHA51273680b22df232f30faa64f485a4c2f340ba236b5918915866f84053f06532b0a722c4ee8038af3689ac04db41277c7852f7a11a0a15833ef66bcc046ee28afb7
-
Filesize
5KB
MD5f2d35beab6062228af7cf3b72938e942
SHA169ee10a3663e33df221afd0559e4887551361642
SHA25602227b85655f982ceae88d05ae5728326f47a4fd825bea46500c0648cd0d75f0
SHA512844de6c5d6ded755a3633f6b4e531efcdcb84eb8807a12a4369c71cd175a9ada5f9a0588f2eadbce868dee37bb97d890af8cbb7b889c141e34208e3d436f5d9f
-
Filesize
6KB
MD5982dcac283d51e3bf684969cdde2dd49
SHA1b14856a216a1f251868a2bdfdc51e1aa4503b6d5
SHA256777d6a71cb16e7a80b1e20a7d3ea3189c06506af20d7a96c854643f95680ffd2
SHA5125a63442c9f6097aae5b6ccb68bcfeb5e599bf2d0d999f8a53c9d8c20bc7d3a5541809e62912aaea44a09fea1af13d7f627090159ef59cbde1e2482ca89db76f5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD515120c381d343edd3fd16e3bf1dcc914
SHA174cbe162b3d407d47c2d2cc034d8b1fed51e0d6c
SHA256338cf6681e3b63c9f570a266116808e282001b50998c63320e33c31bbdf1ccbe
SHA512b1283fa57f2f07022014331d4d7f3bfcf0f72e1820b9f3d86042724ebde4b0a130168ff807e9d8c68a05c8d28cd18ed35c7fa988111e6a23c92debaeddae378e