Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240709-en
General
-
Target
sample.html
-
Size
128KB
-
MD5
5ad3aea4f1fad887b5cdf350e13f6f58
-
SHA1
894c076c0f8b1217056c7d586c135caf9dd0187c
-
SHA256
70ddb1b97beb0bf5663c55df3b945bc299e42bffbb12b3e60415a3779cf806a5
-
SHA512
8926e62073e47553c34972eeeee57678e7b8e0ecc26d29fbe0bf5029752b29df64e87ddb11b930bf1ebbe57b513cb8b49c8916f91c9db8851fa7fd26f412a1bc
-
SSDEEP
1536:2aML5FZrWap3UhMhhwbP0afnLSGUbb4wT5RvS+Z3ZwHPpQ4G/cDicNMAepGUHj+K:UFZrprhhwPLSGUbb4wTFjcOcNMNj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 892 msedge.exe 892 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2176 1688 msedge.exe 83 PID 1688 wrote to memory of 2176 1688 msedge.exe 83 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 1836 1688 msedge.exe 84 PID 1688 wrote to memory of 892 1688 msedge.exe 85 PID 1688 wrote to memory of 892 1688 msedge.exe 85 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86 PID 1688 wrote to memory of 4992 1688 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98a9546f8,0x7ff98a954708,0x7ff98a9547182⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,11782764977566161858,10256506857801623769,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,11782764977566161858,10256506857801623769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,11782764977566161858,10256506857801623769,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,11782764977566161858,10256506857801623769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,11782764977566161858,10256506857801623769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,11782764977566161858,10256506857801623769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
6KB
MD52616d90bf6180b754e8c89ac8644c1fc
SHA1e144ca35c9559a5622e8d9f6a268cdc7c1d9ec0d
SHA2568adaf353da3d04ec09b027478ba92c2b5485620255651ae78c1a69239bc30c06
SHA5126eba43adaf7f5f293da21d434f0b630a86bc12eb708ed07417a47ade85a37b7533153035ec49da678b00839ea44508c623cfd625d7f9e07d0cb64c8c34fde76e
-
Filesize
6KB
MD56ab6116b745682520953b734cafad6b3
SHA1961217a88232b3a699d4cc21c7697bc799ecb8b7
SHA256c87649d1e7cd72b471d8a09fa1998018103921bfb0f1ecc81d369ad8e2c161cf
SHA5122608309646f1214211b69856ac508859442a2aab2e040055e670d631cee95e1fdb968a16f0ecfbee6e16ea16a77cb24392a180a869548603d5ad53f6f4304bc3
-
Filesize
10KB
MD57f7f52bb80c2e9e8aa2be8f66a0cdea5
SHA13bbe7aa34d43d45ff9314837cf268ad3e0438fbb
SHA2564fe58f4bacb94929a7022f2ca8e2c649db2016f30028ec377d318fee4907fca7
SHA512572fe267cce71fe581692bc5222ba77bce053577fc21a9252461000d6e843e0dcda693206fe275737d40dd044081a155c4242653e838eaba971527d8b5724cae