Analysis
-
max time kernel
112s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:47
Static task
static1
Behavioral task
behavioral1
Sample
02d456797e42aaeb389c0dfc19e2e590N.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02d456797e42aaeb389c0dfc19e2e590N.html
Resource
win10v2004-20240730-en
General
-
Target
02d456797e42aaeb389c0dfc19e2e590N.html
-
Size
45KB
-
MD5
02d456797e42aaeb389c0dfc19e2e590
-
SHA1
cd44eefbd839a3e4a59055baabfac592c1c16b46
-
SHA256
bff6d56a89362a7ce6a9f15071aa5df55b0cdadbd8b27a7c970cc58c0a025cb5
-
SHA512
f0bf3da432fcd2b9c50c1ecbbfd146ddff63608e73d7d29523e29a630e0cda8b35ade897e6a1ee4b2236e8631b5118c4eb2969b9edda130349c0017ccdfae87e
-
SSDEEP
768:cQpposIQY86Vx1xLKSRrIxoQBXdX1O5MgJd6NqRVYJdwQxS:bHuz4/tTfwQxS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 3052 msedge.exe 3052 msedge.exe 1396 identity_helper.exe 1396 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2956 3052 msedge.exe 84 PID 3052 wrote to memory of 2956 3052 msedge.exe 84 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 2132 3052 msedge.exe 85 PID 3052 wrote to memory of 5036 3052 msedge.exe 86 PID 3052 wrote to memory of 5036 3052 msedge.exe 86 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87 PID 3052 wrote to memory of 3128 3052 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02d456797e42aaeb389c0dfc19e2e590N.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8daef46f8,0x7ff8daef4708,0x7ff8daef47182⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,9976492728686175584,9294391839953005481,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD523b6e2531d39ba76e0604a4685249f2d
SHA15f396f68bd58b4141a3a0927d0a93d5ef2c8172f
SHA2564a486d7be440ddf2909be2c2b41e55f0666b02670bbf077ac435e3cddc55a15e
SHA512a1a7fef086526e65184f60b61d483848183ef7c98cf09f05ac9e5b11504696406120ab01da8ed7f35e3145aa5fc54307c9397770681e4d10feea64113e7a57cd
-
Filesize
152B
MD56ffd468ded3255ce35ba13e5d87c985a
SHA109f11746553fd82f0a0ddef4994dc3605f39ccec
SHA25633103b1e4da1933459575d2e0441b8693ba1ede4695a3d924e2d74e72becabd8
SHA5125d5530c57faa4711f51e4baef0d1f556937a5db1e2a54ee376c3556c01db0ddf628856f346057d3849baa5db35603b96a0a9894f3c65a80c947085eb640348ee
-
Filesize
252B
MD5d6b79eb0625667611458708ac99bdb1a
SHA1b9a90874c43710f77838c2385883af4625cc5fe9
SHA256cd5eab9dd53eb457dbf90dba89d1220d9696301dd1f9d4f281eb90953703dbdd
SHA512da52932c9bdd63a8bf7be91e826a2b33993b2a05d4f06f166201f0fc091ff18cf622be81f7a370fc149a23951dc92ce995f656fa4742065c5cb05ee078348095
-
Filesize
6KB
MD57efa504416ef6cad03788fee8cc5a563
SHA1ae65780f7ff53f75ceaa887981b8263b63b83f5c
SHA256e850b4cdbec70d4a83114f5631755e763db9ee01efda702f871fe4cbf138034a
SHA512343bd418dab7321ece7903930803a1694afbdca138f14ca932d945f018dd0fb9a35b977accf04b606fb8cfc771a33f28b93a4f8304a40159d039131d771eb571
-
Filesize
6KB
MD5795183de5a9114a08a829381a2fb4f21
SHA138af02886d5bfd3a280398cd1493025aca9fbe2a
SHA25652d78abeaf1f36373dbcb24e383fbaf1f53cebb0341263a12f650b8bf279508f
SHA51217fbf98c1491f939bbb396431e006b057dd6b92eff650f914f54806beb15e21660ee7fa712d43a8fded88045684a0bfef5cdb4cf5d6705094b1bb8f275f7db65
-
Filesize
372B
MD55647f517e84dc24f08c8ec68dab776e3
SHA18338e6e64651fab9f556b81024ba00271481baa3
SHA25686582224ad241231903dab37b53d6263da3dabaae88ad72fdb8ea0bb6110111b
SHA512cd73be9d9f3f93c7e97e0f1823ac7df557214f55b6f40b3df28d438972e4c32a0b9dbea9eabe919e67386d59f3de6896bfadfe6c22bd20fe6ed4ee65b54511e1
-
Filesize
372B
MD5ad5ae7e5e54fe81c30b01be1a841481e
SHA130791f2801d430975c4d8cb72dbdd64ae67b565e
SHA256c6ff29ac651d475d31a82db257ea6bc972bd4e5905e182a8ba28aa517b692937
SHA512a1053d3222ba778181b577d44e39c1bd1561ff2bd62d3d0d7614cec85bfe592a4c0be7b649cdd5ae181db3c72613b9b5e1bc5c7c4be5e93bf0437cf502ba9549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c8cb03178e1165b17d5266b85cbc6697
SHA1f4a5018b3c70dd233fd0a1d35da11442a6dfbc7d
SHA2566cfe78440f7dea3860b2bdd036963ba9b5b3b46742565a57e60ec4a778633c51
SHA512b463870efc90fef3ae485c7823e304e9bb90a1647f09b7a6bcad6c4617141c626502c206b9724972795b6740428062e55a864808d09accfbc7d600503f538b22