Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 06:50
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240802-en
General
-
Target
.html
-
Size
43KB
-
MD5
d77f0291b579eaba36d768be95320150
-
SHA1
2c3da467beca67f9c8d0829a6304a91abf64ead5
-
SHA256
228a7165d5de35569eefba48aba1b421dcb0db6f2b2c6c2f4e8869f43165b068
-
SHA512
fee37afd9ee005f77eb890dc4645070be4e45165b7bd8b05873eeb698bb82cb86de9cf787cd2e64278e2996eb09c9232b9d9e035da469221c94342a0be32d897
-
SSDEEP
768:Ldpqm+0Ih3AAtEpA7Iw40P0Mad6nTBv++nIjBtPF5zfJkPVoEAdLTBv++nIjBtPs:Ld8m+0Ih3AAtEpA7Iw40P99nTBv++nIt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 3876 msedge.exe 3876 msedge.exe 4832 identity_helper.exe 4832 identity_helper.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 1240 3876 msedge.exe 86 PID 3876 wrote to memory of 1240 3876 msedge.exe 86 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 2680 3876 msedge.exe 87 PID 3876 wrote to memory of 4532 3876 msedge.exe 88 PID 3876 wrote to memory of 4532 3876 msedge.exe 88 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89 PID 3876 wrote to memory of 3008 3876 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebdfc46f8,0x7ffebdfc4708,0x7ffebdfc47182⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,13972339959587621986,2295576813842039607,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
190B
MD53a3dc5b2f3949c59e190783e790c8e23
SHA117b40abae512573f3785dea0380de5a6128157c3
SHA25634a9b7b9d03d0fb580a6051af36a61ff44f445d6fc97200b57becc436d531ac9
SHA512f23aa81c8f8d7d15aeb9c30ffbb87150a310c236593219d7098cd6d4ee1863ad33627238db8ac0bace380015ba70ca6583b42d1871fda000f116bc5c726c292a
-
Filesize
6KB
MD5e1b44e896c1cfa98f811b6b2f6b28f05
SHA103387f82f4cd1bcfe5240cd18f45f722d122bba5
SHA2568c19e48ca655d25bbd5b8ac6aa5e14a59f6b81051f2755f45673438c1efd7017
SHA51213bc682ae602c02f0fd3267bbe1064543088f64031bf08ccef7e909e3ff61414790d705dc0fde02c24cc634114d8eeb7b128ff769e4a21287884178188e04d25
-
Filesize
6KB
MD5bf1b2545e4fecf6be2a030f6e7f700a6
SHA16681680f92f6422e1e28303d59a64926a73afcfe
SHA256d0cf52945c441e6a622698d7ed060ae61283324893935ecaa5b746efe824f6fb
SHA512b83861d3bd52adf96783f04b375f468e96f3cdc1e458bd61e5084c2346d4a21a7438b934c765ce241e8a7ad6be4cf84b4023f4c40a27cbfd0e0f66bd168096a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55b7a321702548263f098ca57b4e00567
SHA1d17d8543336477146752be105ca74e366f88b518
SHA256c8ae084a6379f11dbee0d341546af4bf83b6e86059d33bf8921fa2918581b190
SHA512f7b56bd4f466b0d34f02864c8ea3199baa98eb1a1a7ca54df8eecd0c27b8f49e7be998c20e07c594ba76400b51bf5dd65568fb3b974544349855c21f71bde263