Analysis
-
max time kernel
295s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240709-en
General
-
Target
sample.html
-
Size
32KB
-
MD5
d28116a07f534c688297ce9438fbb362
-
SHA1
4d229ad997c1bfac40747bde1f42c17b09d68d7d
-
SHA256
e09cb12a8fe6f6dd559c0e636b1d331c84b0cd1a09642a5c5fc7bf6044bc3d90
-
SHA512
d2cf8b246662cd5ffef504ecfbe2cef1597fddf201c517a7480c6dd600f06b80af35dcb92712a37d5ee313ec70a986150707085a2767c485df99e97d99a35d3b
-
SSDEEP
384:HRlDaW/DZtDNSyDdcE0wQDRvDdUsdGvojwTr3ZdqZUaAYkW3OD0+YijGiMwtDclj:X0dhaZdapp3H+YijGixaR0AhZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2148 msedge.exe 2148 msedge.exe 4748 msedge.exe 4748 msedge.exe 2560 identity_helper.exe 2560 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 824 4748 msedge.exe 84 PID 4748 wrote to memory of 824 4748 msedge.exe 84 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 4164 4748 msedge.exe 85 PID 4748 wrote to memory of 2148 4748 msedge.exe 86 PID 4748 wrote to memory of 2148 4748 msedge.exe 86 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87 PID 4748 wrote to memory of 3840 4748 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8008c46f8,0x7ff8008c4708,0x7ff8008c47182⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2191905559262577950,11761736895142584118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
396B
MD578bda59b275a542e78e4bede09b41147
SHA1bd26947074107e8bf0b13e02ef4291fa17af226f
SHA2561b5d1b147e79688609cab69718099888ec777244898afb902f0833aca4c85cf1
SHA512f2a5c2a333afc35e1b37227084b34e7dec56a8babb4a2feb0567b690ac53bf548c354c09edb1def7f1591c9ac8647aa370817c8306150990896e4f28342b9bc6
-
Filesize
6KB
MD51aa4a24d1615feccc294c13020225514
SHA1a1f462fbacfdb8daf292f964ba67310550298396
SHA2569ee4dcb8d42a9bf48439f1745fdeb6d53c450feff5309ef2ad43032db56c4717
SHA51298eb01e23b929a858c47662b823ae56c6473efcf3b07c3ad6f70f25b44d4ce455a5c6a8564e4e90794ae55711d2fd258442fdfddb5bdab37395519128195de22
-
Filesize
6KB
MD5e2ca484b73f0ebfaa5b83911423d6d25
SHA1fc6304143f0ca44ecb570768ff43dfbf111f6b03
SHA256aeb4cad5250a22974fd1f1dd01ff50f64aaf2298e66a1d80b7e4e816a256e70c
SHA5123eba1fec7592ac4eb9f8ddf68f50c46ca7ef038f2177a2064e2c7c292990a411033aeb54b25e0110e24ab886f7a9da9235352786ec69c5e8bc77d548bbe69bd5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d5b0de97-3fb6-4680-bcc9-1b2015b8c0ed.tmp
Filesize5KB
MD5f692902775997222480a8ba714e8326b
SHA19efd6c6b289c23e409f842c2efaac5cb5cdc88ba
SHA2564bc7bf51bc284b59beb36c9f8d536ae09a7a27c2d686c480a752a7f38d0011d7
SHA512f9151d9dc2d5ace9e15539910966072bff33bd036e167040e00a392abf17b52a6e2cf2c7afc92b98467daa225932620cbcb59890c567e01710f8ae9610588f26
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5781dbf17c2c172bafe1c7c24991a5a18
SHA15baf51115d984ab02cc4ad05e355e525d0847bd9
SHA256987e6a416143b2cc42924522ff9c1355628383c9661ac3169e6e492282704af0
SHA5120922250b4ffc49e31a62b24b11fbbb01bfe7d96e2f6abc8bc4f95e4cc6a9d60a2d4c4470554f4d2fe7978174c5b557b4998f86242ac056f195ceb306c18c32cb
-
Filesize
11KB
MD507c456ac8956d56c02e1da1fc27bcc81
SHA194e07043d24de64e22b3c92485a32444177d9f7d
SHA2562c57c52ee6ec13093efaacb97f99f3cdfd6815ba60761a0f9b7a8e2c4528ceae
SHA512ed765048f3bc976ca8807f7f62fda3c3fb93e830cca7df33867a3e3d7b34fbfc64df4ea7bba18f2783e05dac378458ee4d9d496cd5c6d23209bd7e3fdc55f49f