Resubmissions
08-08-2024 07:55
240808-jr73ba1erl 3Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
a-z.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a-z.html
Resource
win10v2004-20240802-en
General
-
Target
a-z.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1800 msedge.exe 1800 msedge.exe 1648 msedge.exe 1648 msedge.exe 1996 identity_helper.exe 1996 identity_helper.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1648 wrote to memory of 3868 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3868 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1968 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1800 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 1800 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe PID 1648 wrote to memory of 3700 1648 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a-z.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdd6546f8,0x7ffcdd654708,0x7ffcdd6547182⤵PID:3868
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5000
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:4136
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2707240397262779873,9670670167531978323,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
6KB
MD59bf054f274bf438ed795d7e2c931cb7a
SHA1efd6eba1802dca2cebf5b0ea863bc4260c262a21
SHA2560f215888f07563422206329114f97abd0d35b1250ac4ab5b848b3719329e5ce5
SHA512a3c1fc2c7f4a189261b8e5a61298d9e7a5b3ed6abc762d05d71924bda791302fbf3339c570ecccda06d553cdfe911ee1d19bcc41d5ac75a91f7d946554b1e1f1
-
Filesize
6KB
MD52f8f4b8b0ce08d257d0bf40e06bd27b0
SHA18dbc34cc502f3a3e75615c8f0be3ea20d0496c6b
SHA256fe68840eab2e50e8f1f9f52c91defdf91701e7c968584d52270fe7fd0e8c70fe
SHA51279160357b3433132c26f1926cebabcd74fe1411919fb5413a047310c48afba6794420c4a0b6aa1d6c6661dc284cdf69429de961254717e151c762eebe2c1828f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54d0d945c7dfb6773151e0ba8c2ea812a
SHA1f11e7ee825c98d28f6cb5bbae3df4816e074782f
SHA25682386ea64401d51b42b42e6676717c55d8ee224127b9b652e5e143698b7b0dd9
SHA5123ce28e04ab0bff5c5278c4586d54f7adcaa6acbf51ba0dad1668173b89a6c8c2f3d7a077d66b32cc1daf89cf7a8186be87fae8ade1db9ebf2556eb7026111a95
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e