Overview
overview
3Static
static
3CCProxy.exe
windows7-x64
3CCProxy.exe
windows10-2004-x64
3Language/C...GB.chm
windows7-x64
1Language/C...GB.chm
windows10-2004-x64
1Language/English.chm
windows7-x64
1Language/English.chm
windows10-2004-x64
1web/cn_accadd.htm
windows7-x64
3web/cn_accadd.htm
windows10-2004-x64
3web/cn_accheader.htm
windows7-x64
3web/cn_accheader.htm
windows10-2004-x64
3web/cn_acc...in.htm
windows7-x64
3web/cn_acc...in.htm
windows10-2004-x64
3web/cn_acc...er.htm
windows7-x64
3web/cn_acc...er.htm
windows10-2004-x64
3web/cn_index.html
windows7-x64
3web/cn_index.html
windows10-2004-x64
3web/cn_list.htm
windows7-x64
3web/cn_list.htm
windows10-2004-x64
3web/cn_log.htm
windows7-x64
3web/cn_log.htm
windows10-2004-x64
3web/en_accadd.htm
windows7-x64
3web/en_accadd.htm
windows10-2004-x64
3web/en_accheader.htm
windows7-x64
3web/en_accheader.htm
windows10-2004-x64
3web/en_acc...in.htm
windows7-x64
3web/en_acc...in.htm
windows10-2004-x64
3web/en_acc...er.htm
windows7-x64
3web/en_acc...er.htm
windows10-2004-x64
3web/en_index.html
windows7-x64
3web/en_index.html
windows10-2004-x64
3web/en_list.htm
windows7-x64
3web/en_list.htm
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
CCProxy.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
CCProxy.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Language/ChineseGB.chm
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Language/ChineseGB.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Language/English.chm
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Language/English.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
web/cn_accadd.htm
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
web/cn_accadd.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
web/cn_accheader.htm
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
web/cn_accheader.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
web/cn_acclistadmin.htm
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
web/cn_acclistadmin.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
web/cn_acclistuser.htm
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
web/cn_acclistuser.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
web/cn_index.html
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
web/cn_index.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
web/cn_list.htm
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
web/cn_list.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
web/cn_log.htm
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
web/cn_log.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
web/en_accadd.htm
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
web/en_accadd.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
web/en_accheader.htm
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
web/en_accheader.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
web/en_acclistadmin.htm
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
web/en_acclistadmin.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
web/en_acclistuser.htm
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
web/en_acclistuser.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
web/en_index.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
web/en_index.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
web/en_list.htm
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
web/en_list.htm
Resource
win10v2004-20240709-en
General
-
Target
web/cn_accadd.htm
-
Size
2KB
-
MD5
feb36313de06df2b1f320846b7159f2d
-
SHA1
58ee007e3faf4fdab367c53d03ea2d5e32be8e8d
-
SHA256
bf64134b09a637be4b1f85d567b2df1ac3f3618035a3ab91abe0e18f8c62f135
-
SHA512
49ccc53c2e78ec3a00a1ef5ab8809bd41a95a36b3f7af855dc1b55644bbbc44b8840fb4fedeac2a2fe0db9572310d1424b43753012c43e9930e3e3da36b11267
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 456 msedge.exe 456 msedge.exe 3228 identity_helper.exe 3228 identity_helper.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe 3840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 456 wrote to memory of 3360 456 msedge.exe 83 PID 456 wrote to memory of 3360 456 msedge.exe 83 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 460 456 msedge.exe 84 PID 456 wrote to memory of 3608 456 msedge.exe 85 PID 456 wrote to memory of 3608 456 msedge.exe 85 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86 PID 456 wrote to memory of 1340 456 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\web\cn_accadd.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3dcf46f8,0x7ffd3dcf4708,0x7ffd3dcf47182⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2696 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15614170709973160342,17970188548800195249,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
6KB
MD59f7d250b399086f1a7738fe29b16cabb
SHA1769c3a0e7c222c1c1d1c3d12b63375c5027807ac
SHA25685bb664a1f8a66372349a971b0dc2f34b11548df42bbb0830c74be82492279e9
SHA512f4f2b93ff85a66eb67ce5e0dbf0e5e0529e594fbd69f26562b2391125293f647104ab64beedc8b3336119ae1eac19c40959fe9593104fa19d2ac84e837cd6a2c
-
Filesize
5KB
MD5aa3b08154fb7ad5583481ced03fa5aaa
SHA130559c99103b3df3dfff56e200e8f0b31ebfb5f4
SHA256c353134e1575a80881b955f478346fe90479b8c9a7c22403aa090edd33d393cf
SHA512736d91146288195fd3e883f47169a311eb6911437909ee16bb010aad0171d318f919f6c4e7e11219f789b8efcb6c9cffda35795995829719861106a266895386
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f1b5db705260d6a09416ecd40c5ecf6e
SHA1f3e3e8f3ac284a269d260172e748fa9e26595d49
SHA256ce6acf4c4823e1152cbe05008f647179a8686aa439cf829077698051cef6e3c5
SHA5125f91a30a9b2f299ef69341b5a1f21c7e44fa4eeed8352260e1ced8f6918b8012fd178953e2733b55eec846215c7e1a0073a7b856a363ca8371f3f350a3e26dca