Analysis
-
max time kernel
35s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
VNANR.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
VNANR.html
Resource
win10v2004-20240802-en
General
-
Target
VNANR.html
-
Size
2KB
-
MD5
840ca221a836c6706a3cec539845e6f7
-
SHA1
41f6ae880cab506252fe35db17b1ebd5f36b52e0
-
SHA256
d86958474009b31b63f91842f09a1e8caedae1b9f9bac05f774108efea26c4c5
-
SHA512
fabf8a6b330577019fcfbf28c4921d96e43f6df1b52b7e86bf7ea157801ac6e3d9186f90d27bfec0a4ce34a6f4d0a18d8655191f88e9a03f155ef8b1d6942152
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 1768 msedge.exe 1768 msedge.exe 1048 identity_helper.exe 1048 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2640 1768 msedge.exe 83 PID 1768 wrote to memory of 2640 1768 msedge.exe 83 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 1812 1768 msedge.exe 85 PID 1768 wrote to memory of 4984 1768 msedge.exe 86 PID 1768 wrote to memory of 4984 1768 msedge.exe 86 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87 PID 1768 wrote to memory of 1512 1768 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\VNANR.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8996946f8,0x7ff899694708,0x7ff8996947182⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2404 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16523822587548809253,9454690539499520291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
171KB
MD5bfd53b46d0e82d6ac195eb81cb807104
SHA18fce817487f8d6716c10040a8ba6c63750151b65
SHA25636acaa0485a9ad92a670533d7e5a5f3bdb72b41e06a3cc4e40b48a0419d71eb5
SHA5125e1fae7bfefbdbd41aaa2fbcbb646af1d5e72edbb2a7f58f944d3f82a7066fba00f465992a5a7e33a2276742fece9a110e3c0e8d3f1f1a4eba0d53036da76389
-
Filesize
246B
MD5d2912a9fe6a7ded3529b6a79c7ac7705
SHA1096b8f66abc02c760d5e26cabe2aba2fa662a353
SHA256de876c3b3ee4e43901ebba04bf1edb96f95b3c2271eed639b4de26b07c777ec7
SHA512ec09d660520a760b7c1537685e739283f3f6fb40ecc9034f8ccaf083984edbf63ee93a5d089130aadd140b9d2d0bed59ca39efb413a0388eed770027e34c30ff
-
Filesize
6KB
MD5d944575365f54bb099c11736a9dbe0b4
SHA1907a108a292f4cc17b83b76db7fe984a1ee2961b
SHA256d85621908c718e271022b50bd346a75eea895aa72a2d03d4cf7736350786149b
SHA512f1058b26f971674af41a8b24c7a434c91002fd755736de37a92940082be34e09c79bdb8c09bbfa6fcb3c70c89ec1eed98f0a11f7da214f29e50078eab884c99f
-
Filesize
6KB
MD57d9c601af3ab23233db265331a77453c
SHA18e35774dc880e56bcdc34f38d49a625747d8bbe1
SHA256f060afc99a80b0608ffc452d7cc9fcda18674c838b0e77669ebed04ed4a07a21
SHA512893dfb3e0177c4373ecffa3aeab4ef14610f350e92b528ec0f45fa54a4aef1c425766d1b2817e949d9cad2ab6c2c0f9f60c8706a00c5b02c977ca0c553526d9a
-
Filesize
6KB
MD5b609fd52bc3c3279f8f3364b47079c88
SHA197054381974039f752f24b6f6bb822b5387423ec
SHA2564f7c4c6a03943d42c2057bdd45f15d00fdacfef038fedeffff44f236245e112c
SHA512743e86cb4595667e24de53405ffe82fec1a249f315f1e98bb9d0fda68f55e1e7013c17e4bd0a4e26e85f395cfe647ff1945f679bb52ef9229969561271ceda07
-
Filesize
370B
MD512c0ec3a18bf84ecbecf8756ed9e771c
SHA11ed3849285e334661cf627f63f23830a60599eea
SHA256497bc25a312c4230254b1ef2a85c557c2d11591a972cb8d331bbeda94e88bcd6
SHA512758e73a53eb080ff4a652789ed8b57d115624d4b38b686c97e7fdf662a2da595117e7438781cb8a9390567858afa02bf1e5fb32218dfa3a045717d21ff166d5e
-
Filesize
370B
MD57221b00e467b4c5b1cdb51146da84fc7
SHA1abd663440ce26894714bb9fd67e1e2b9ea2bb897
SHA256b2d3255f5c18a00f67c96a3c769d79d82408c229b491d9f2e1cd1de739547733
SHA512d7b358c58d03e7b072ebf8386a2a9711fb80b16c2cb469baf8f7be086dae1cf03e6be8076a98040d05b48757851c614616a23fc148cea214ab2cd3c98673a9e0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50199d1ee60a65da1774055a6dd8bc1db
SHA1091350a0c93f5f67f153bf0ca4eec6227b7cf645
SHA2569049c22bbe9dab34f98c78bd4afd66b546385f6c473012ac5a900e799196fd66
SHA51222856e0de1cbe66e30f5d29931b7bcb7ebf7a0af9cce34c433f7537b009beeb92042e4833fa6ac9ed02820f60dca355449aa7ac5311db47c8552a6f76b40495e
-
Filesize
11KB
MD51ff81130486fe978c885ced86fbd353e
SHA11cd7d2577ec0a1547e48ba7dbf77f7cde1ec6f2c
SHA2568f398615c2958a31565e36477378049a57cda12bd39f369b9622150912f685c6
SHA512b9c3ed43cd299c05039d9ec1ab72118def9289753cd34e5ccb5cb520c32caddb19a5dc25a6c6cd9ebb693156d77cc0276b446f3e32b2856a5ff3836ce3e4010e