Analysis
-
max time kernel
88s -
max time network
64s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/08/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
quick-start-guide-cloud (1).html
Resource
win11-20240802-en
General
-
Target
quick-start-guide-cloud (1).html
-
Size
5.1MB
-
MD5
4aa3eead2796ef12c5455bb19f39ef52
-
SHA1
cf305da5f3a9517aabb8face50f89d0eb875a502
-
SHA256
dc52d5553525864bf86eb03edd779c366d683beea6bd94545254bbe38bef9008
-
SHA512
68926aa578e23173413c3f7160872ac7126863d55d21786b5ee4f73aa5389c0d25866f96c15bf9393bdefeacf60453978f9785723648536dbde5b251e10cf0a0
-
SSDEEP
49152:6OKbN5DkQH1INkEX6J0/BW11Tqk5Fifp7WL4vrAFK3vsKL3ClqdBMJXlul/loX+z:R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 4600 msedge.exe 4600 msedge.exe 3504 identity_helper.exe 3504 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4528 2688 msedge.exe 81 PID 2688 wrote to memory of 4528 2688 msedge.exe 81 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 1796 2688 msedge.exe 83 PID 2688 wrote to memory of 3492 2688 msedge.exe 84 PID 2688 wrote to memory of 3492 2688 msedge.exe 84 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85 PID 2688 wrote to memory of 2032 2688 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\quick-start-guide-cloud (1).html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xe0,0xe4,0xe8,0xdc,0x10c,0x7ffcef7a3cb8,0x7ffcef7a3cc8,0x7ffcef7a3cd82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2164 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,16082740156329707095,970231919916963169,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD51bb163e307920cc94f174ffae006da69
SHA15ffdceced157fc8d188106ab26e1bb325d73f6f8
SHA2562f363479dd1231ccd73d944f266d6bafe057b097c3023b730a6c63c65efc746b
SHA512f3e92360d3c5aa59b3f6f24ce251a1b9517811f6add0e12f8819a01be7e1e9139a189add388fac1a7b5955845879fb7ad27496691a40e6853e43cadcab185df9
-
Filesize
6KB
MD510496866d14730e214776df19a894f55
SHA1dad367595daf1ab5c88f790598dc36bb0116c610
SHA256b92ef56cbd4d06c08dc4d0fd9e2b35342505dd62d353a0924b001c894867b781
SHA5123bbab7000ca52a23c11291b50265992fdd45dbe7b45836a6337aecef0512546983354fef107b37974a113dd1c91857b75c2feaf8459272294af6135ddd46b035
-
Filesize
6KB
MD5707240a3c713a6470c27d4ad38dbdddc
SHA1def95346bb11503eac419bfa775a555844fca400
SHA2562bd50234a36dd20e8e4bcc61a42298687e0c84aa3969fa53df6426b6b6d56c21
SHA512e700a0f1c427b70b1c240339e26735052d847c66d9aa8271921d45264e97cba152efcaf195ed2ad4a20c7910bd7712d6ef98e4b7ee092d5527f11cf7afef5281
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5958257f64b8381f7829997b47c86b6b5
SHA1ca4e068547ce76becc6a839a89dbb0d8c14793e0
SHA256cd4905e647f4e69e4c56806c6afaa8dc827478e4d1f5d47a71dfbd040e1d0025
SHA512e9a390236b21c3b70fc78e1498ebf5f7d7ffc3b6ad326204aacc7dce338e1cdbf14c3bc96ff69deee70dbc82309ce74640d5a7465978c1feed0ad21944bdc2f0
-
Filesize
11KB
MD583f32c0d9595b7f65d3e6b5905ab15ff
SHA1efce798f71075abb3d04e783a0361e51cdbd378a
SHA2560e2179fbcc610df67d57ffd45b16d09b493d0865acbc6fec684bb1d53a183c1c
SHA51298083f1bc7ed3465c09d739d64a66e19e887d15e9ba4fd516968c7e25c0f2dbe4e1e457fe150305a48c3c43d31112f1ad9144b246966ca9347c3aa319577d76c