Overview
overview
3Static
static
1index.js
windows7-x64
3index.js
windows10-2004-x64
3projects/o...t.html
windows7-x64
3projects/o...t.html
windows10-2004-x64
3views/dashboard.html
windows7-x64
3views/dashboard.html
windows10-2004-x64
3views/ide.html
windows7-x64
3views/ide.html
windows10-2004-x64
3views/login.html
windows7-x64
3views/login.html
windows10-2004-x64
3views/register.html
windows7-x64
3views/register.html
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
index.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
projects/oxyzz/test/test.html
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
projects/oxyzz/test/test.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
views/dashboard.html
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
views/dashboard.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
views/ide.html
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
views/ide.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
views/login.html
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
views/login.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
views/register.html
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
views/register.html
Resource
win10v2004-20240802-en
General
-
Target
views/ide.html
-
Size
4KB
-
MD5
1751d5cef77f4e234e50aafbdf4faa21
-
SHA1
6c6251ca6d632d451c559e14e9a5784804a65764
-
SHA256
8c57a1ee14f3b967667638376408ee61161a94436feeede7ff0b96292f3349d9
-
SHA512
f2cab301c64d7ce1e874c1585ef60372e050e98fedebba0fb79932260953e32801d321a9d6438559a9b8b1d82e2f9381ee74d6c75378d9325bdf7cfc3e52f7ab
-
SSDEEP
48:tpWeVOKU9o/pDXXUoDDXTG/EMHhhxeaJhQHN1iGswo5ieycKhyQ7gPpQagVGC5yq:PWOW9o/pbTKcIPxPQHff+1uhvH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 264 msedge.exe 264 msedge.exe 4864 msedge.exe 4864 msedge.exe 4552 identity_helper.exe 4552 identity_helper.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3524 4864 msedge.exe 83 PID 4864 wrote to memory of 3524 4864 msedge.exe 83 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 3688 4864 msedge.exe 85 PID 4864 wrote to memory of 264 4864 msedge.exe 86 PID 4864 wrote to memory of 264 4864 msedge.exe 86 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87 PID 4864 wrote to memory of 2480 4864 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\views\ide.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd16d946f8,0x7ffd16d94708,0x7ffd16d947182⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6756712427635608085,6122720974297819952,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
700B
MD52e858adbf044ad53665557e328fafb2f
SHA12d9955020c11bd230ca7ccce6197fc051b2ad19a
SHA25617e44e10d4d5e3b85b49bccff6715a11cccabf4fe0be80ed1f0c77389b8f577f
SHA5128c88b7ca09bb4f28261faaa045b6e48448941321d1177f24b4a6e30292c3aeb9fd769ebff889d66e4d79f9d0c5fa2de667e95cb66be7774305bff344aee1e15a
-
Filesize
6KB
MD57b97d995cfbac2461ea4f3022e1ec654
SHA13477e0c5295474204eb3db75127b323976494fca
SHA25659416b8dc4b4bde381b4a69a3dadd14ead9968e7735293aa50453da9e8cb6224
SHA512dd9bf38ae48716daa59c4587f1344f8cd73c74f698d6ede162ca977bcf4830bf17e9db51678388b440cc43fb3721014089801531bd26b1d44964e2e286bdac77
-
Filesize
6KB
MD50dc3850c0d876b57ff0f0957d5ab643a
SHA1b44eafeafef4d448c0b789c1d755d65a9c571087
SHA25681ae041daf1c5045ae592db9aa2ae70c3ed4efb1f46dd09742f93d18225b0524
SHA5120aec7dbdc7952b66cbf1caca27af1377ced6277e60ecdab9ca43f44127c1462aab740e1802b536db3bb0e4c04f51cfdfd2230a07cbe77a8e7528a8dc60a17393
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59209da735651cbd4ec4e2c8f341a536b
SHA11063b243fd07be3ed70a875ac1db6038d6493552
SHA25619fed9bddb6d6dcb8b248b2472dedf82f494fa17251bdc24e4b3ef9c64ba6069
SHA512c36ad9a5802ecca6a1052934e1e3937eb5986ba5b00831d44faa73f831abaeb5979a3ab2f506a6a785e8e3bf9b83676de49529eb2fef5e0c8296a53fe138f2fb