Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
6f86486f4cdc39d2ad402d9a67b8d49c889394c244a14579cab763401e8ecda1.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f86486f4cdc39d2ad402d9a67b8d49c889394c244a14579cab763401e8ecda1.html
Resource
win10v2004-20240730-en
General
-
Target
6f86486f4cdc39d2ad402d9a67b8d49c889394c244a14579cab763401e8ecda1.html
-
Size
32KB
-
MD5
4e75aa1ef965cb7ad16dfa92caf9ad32
-
SHA1
94ff5c56f3789397fda70724af6050b3564b74a7
-
SHA256
6f86486f4cdc39d2ad402d9a67b8d49c889394c244a14579cab763401e8ecda1
-
SHA512
64e5ff0989c48bd6a699f57ffaf49b824459d6f4bd3f8f5bb48ff74dea9e3c96e3bb5872ce21b145358c8739a67a772bdd93f90a09db1598e0eaf56bcc0eb24d
-
SSDEEP
384:b5AlqAfWOY2r7l9FjWt8FaIcN3EUSg9xDlE3HPsegdmlBvMq0EqbZjAY3NDoo1ki:bfxDWXURqvMq0EAEY3lD1V3PWXURqv4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2288 msedge.exe 2288 msedge.exe 4140 msedge.exe 4140 msedge.exe 2068 identity_helper.exe 2068 identity_helper.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 1604 4140 msedge.exe 83 PID 4140 wrote to memory of 1604 4140 msedge.exe 83 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 1488 4140 msedge.exe 87 PID 4140 wrote to memory of 2288 4140 msedge.exe 88 PID 4140 wrote to memory of 2288 4140 msedge.exe 88 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89 PID 4140 wrote to memory of 5036 4140 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6f86486f4cdc39d2ad402d9a67b8d49c889394c244a14579cab763401e8ecda1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbf8946f8,0x7ffcbf894708,0x7ffcbf8947182⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5320638377140794976,17795107704865647900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b55d2d2ff2a4d5d7eeaff5ebb96f3b4a
SHA112d94b9e84142b10d6347a2ff3b634a20f692c7a
SHA2563d249eae36cfc3837b043e4b8df670724fee5657b302c77d488f1da3d835f776
SHA5124dc2fe1eeaca5f9c91d548c70a44ffd12b806a385e22a3c5f724b6f749a15c9ccb3ac1a752c63225bd4d1d90f2b25d8004a15d3912ca6a3cb92fcba91248626f
-
Filesize
152B
MD594c981336abc388ca817dab46e7fc547
SHA12d0f8d89a31adb0aad5c599a195ff40ecf4b161f
SHA2564d44efbb5447fedc3cb21311290fe6a9d0e5a0e682387a1a341bd214df820ef2
SHA512f1c9c98f6642ea3b90c8667a4871d5a3b8c05eb0c50d5dc31e32704e0eeca1d33add414df485aced130523d6be824c48e37d0022b4d58db60006efe3e337fdbc
-
Filesize
6KB
MD52c9418749cfa9bd1703b017b90b7f0ae
SHA1723e9776f83bebd0965b3ab66af5c6a4bb91bd1e
SHA25671f94e87de332f429d155411e17b8b486f45cc4b2c27bfceea6492fc40923ef0
SHA512347026db8ec6c56050193c73a96d5c500e5c166f8bf1274899408d3f15a94e0881fae91d4fcd25b72b3543f82b6ce233ba756f8a41adb2d2c3bcb710b91571df
-
Filesize
6KB
MD5748be3ce8818b9083be7016442660aed
SHA125bf6acddf9bd132da1478b27c7c3226ecc6b4b1
SHA256140118b8361e3363756f766f5b7e72cee43e711bbb965bb5e3d571f8af7c0b8f
SHA5123e35cd935ede28fb17003981c9dc6c3b4648a232c54927aaf64a8e3b6c0063e13ebb431b5836f418e85b41f7d2d28ef38949d409e165a3db80a73b8b99b76923
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5660da59d4cc6f994c54919242f46ced3
SHA1b1bcaea51dc53d279450cfbbafc262ed7eac3bbe
SHA256cfeda62212c3a5773fabca54d32b3757102b84800020ee32f34a729d9c0cd8b6
SHA512427af1fc894fdb70fe5bd57915129732260e41b58b71d1bacf01efc4d63e9aead3653ebda24a15373b5df149bc4ad525fde906768814cb62094363e532b897b6