Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/08/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
file.html
Resource
win11-20240802-en
General
-
Target
file.html
-
Size
312KB
-
MD5
1863af78ce3d00a46fb10a1d1ed22efa
-
SHA1
0df380539d71bf7bb8312d1e4f8d97dd4c38b30a
-
SHA256
980130e82e43318b75caf9e8ae1b80755d0abe9e767808422cd98ffd3a460dc5
-
SHA512
8fe8a453dee1f00354f09d18fee2bc8dd93fe35b8b9ac8196a99cf760d51dbbf24e5f7364fa67bb91a95bafad416a3aef10e3988225edbdaba4c2416245aed6c
-
SSDEEP
3072:niggAkHnjPIQ6KSEc/qHfPaW+LN7DxRLlzglK5VjSk:3gAkHnjPIQBSE5/PCN7jB5VjSk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 4808 msedge.exe 4808 msedge.exe 1664 msedge.exe 1664 msedge.exe 4528 identity_helper.exe 4528 identity_helper.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3452 4808 msedge.exe 78 PID 4808 wrote to memory of 3452 4808 msedge.exe 78 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 5020 4808 msedge.exe 79 PID 4808 wrote to memory of 1476 4808 msedge.exe 80 PID 4808 wrote to memory of 1476 4808 msedge.exe 80 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81 PID 4808 wrote to memory of 2052 4808 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb8fa23cb8,0x7ffb8fa23cc8,0x7ffb8fa23cd82⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1984 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,436399959790619826,1642390389409990005,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e2612636cf368bc811fdc8db09e037d
SHA1d69e34379f97e35083f4c4ea1249e6f1a5f51d56
SHA2562eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9
SHA512b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d
-
Filesize
152B
MD5e8115549491cca16e7bfdfec9db7f89a
SHA1d1eb5c8263cbe146cd88953bb9886c3aeb262742
SHA256dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e
SHA512851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\93134607-7d37-4ae4-8ac9-44948a938f26.tmp
Filesize1KB
MD5b6f5b07db7fab16c79091035bd59d05c
SHA130047a4e955b1044ac126f8008c49716e81b2107
SHA256bc11b0a1c677b15617f78c702caeeaa3ac2d830e2273f72532a19bacceb1eac8
SHA512144ddf899a94e36a5efa5ac5aedfee381f6a7d7748ffe248f8dc8f5ccedd5c54da9bf2db69d227d17012b969f24c4d5d19dc95f9f587216c6c4c29790ec8d09e
-
Filesize
5KB
MD55be320e3f3ed63dc2882ee47beda3983
SHA1f556a4ac7a09d26fd0ce87c0d71128e553548d80
SHA256eea4369ce52828fa7b99a2eb7ed07d309fc9163a6b44695e72d23a43efc51cd1
SHA5129c058857429494eea31c0c150fadfc0c29258784da40d090e6e8c3eb102bed87d62bb53c2f97bd13cdfcf18c4fbaacf8a15acea1667237aca87c6345761db17e
-
Filesize
5KB
MD511020b6984ad581de2665e05fa0f7d52
SHA18029ee842d60f1c4412e438ef709d2aa5fbc3d91
SHA25628d368c59b16a95bec4a1b3a0be1f867dce16ad6e0538c7b90d5045ed3de1b89
SHA512a631a3c79ea215cc9b936c7e01b0bc968168e7b9ec41aca3aaeb189de5380702620f444183d034a49b40b9567ed9035f78072b934ac9ae460d9eb03fe2b31c9a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5ac050d5771a6b81180da14be9b3b90ef
SHA1622b9645a0fe54b38f16e4e4568ffc905f3598b6
SHA256911e052883444b784355d88f263fe2822eef6e43abb44ecdc976ff29cc44f3bc
SHA5122ec1ce36df89ff132c2440042495670bbff99d58184819b5a07c2f4eb554603cccb930eb213569f86ca9fcbb1c3e3218e389f2e6932622cdeeedf122d7db810a
-
Filesize
11KB
MD5687338a63216e4dbc5f76dda6baa50fe
SHA1f3defcf600f24d8d47f3743959d7e2d7d20dc7f0
SHA256bc6f375b6d1a6046d2dc58f146b693e9c4337c1e7a5ffeedb5148a0ba5ae695f
SHA51202182286209f231c13d1c60795755627458e7fa88184511c0f34d18a1a448a0a159ad56c4b5883872db79756097e3ff956f0da3c6195524e68e75cf484504485