Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
irVD36RojLP.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
irVD36RojLP.html
Resource
win10v2004-20240802-en
General
-
Target
irVD36RojLP.html
-
Size
4KB
-
MD5
aa367d78cf6c50a5e51bb1e80456bbb0
-
SHA1
b78c9ce48ab6852f889f3f4c9b3f60e03576077e
-
SHA256
b1e14237be40458561602b8161b563732c5a01e0c3c2a95a402cd3319e802303
-
SHA512
46b4c75543cf8745622c8449ed3dce0b1fad8115fd6e4b8a3cd0a61847fa0a3df581fd79bbe936e89fd06fe8c566e0a416bf5b4c8f2f5dc4dc483870e4d10053
-
SSDEEP
96:wm45Qeu4wMJckZcIJcVmpG5vftvb2ciFiA4X4yMWQhXs:wm4GeJ56x/VvCciFiA4oBWQK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 4896 msedge.exe 4896 msedge.exe 2584 identity_helper.exe 2584 identity_helper.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4092 4896 msedge.exe 83 PID 4896 wrote to memory of 4092 4896 msedge.exe 83 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 868 4896 msedge.exe 84 PID 4896 wrote to memory of 1928 4896 msedge.exe 85 PID 4896 wrote to memory of 1928 4896 msedge.exe 85 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86 PID 4896 wrote to memory of 1628 4896 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\irVD36RojLP.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90a0446f8,0x7ff90a044708,0x7ff90a0447182⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8698797032620738766,9254364684885183264,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
267B
MD5b68ab67d4728d28e15648a85db1636b8
SHA1fc26f0ef502d51c1dc5093acb6c6b85eeb6e39f3
SHA2565e9849dec81c3bb80134c93fd870bccdb9444680ccc701c330db16e41a7c3749
SHA512f1443443fef581e2060e598908d6c788a02155868244c197ffd508b7a0cab80153bacc5abaec7d10d2168ba2150a5b5cd6129e7fad9e2f6646fabae3e603dd55
-
Filesize
6KB
MD52c1c6d410f2b25bdd95f95848ccf0e1d
SHA1a344892d357dd80201562e8bee1e58df0c6eaa89
SHA25614ba4a6d2df4eae03b3d761e9ca6f5937b54a4f5278e8c28540cf8cbad9cb439
SHA5122a2e29876f8662aba1874227a9ec928b0b21d8cf84a2a6598a4fd38e07ba3cbbaefadf82690ada415cabaa3191d2548e111b3887497437e2af321de5200e4130
-
Filesize
6KB
MD518c00106ff01c0fbde7843e6529f4427
SHA1fbd06f7ffb6cdbf7388128631b95b0edc461afff
SHA25616b30bd065d41d066243500cf034464395899c1546d7b9cb79009ef8f6a1a658
SHA512dbc098a57e3bcbeac1c65794784f46ed0e203d831cab1f4ccf35dc16bd6a5e4389f472a6a3d8fc35e1d77ca7380dfa8ba24b3233dab1a8864743df24c0016978
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53a154098c0a3c8a11e0f2daf9551a103
SHA1c9ea3bc2292d0945e5df83c335099c11bc3d5954
SHA256f14b4a8716c95f32a03142989409bff6ce9ec23a4f353b392478a0c16b88ff97
SHA512a10bd2be7e5a130bb558d9e4195736c7db3dc1ebc868084fbba84f85da9b034fb5f3efde5e4dd31a9fd090931fe187385adbbe57aef255102ddec33af2d9b96c