Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
html.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
html.html
Resource
win10v2004-20240802-en
General
-
Target
html.html
-
Size
5KB
-
MD5
7ae675def8e8254fd53c0a303cb16505
-
SHA1
b96084059ad36ed3cf6ae2413f8ceb8aa5c90269
-
SHA256
40e8cd20fbba8fa44f29aefe95e8df44c3d5e7ff0f026d37ec44f8c71e5b7ce9
-
SHA512
11ddaf36040b9e41c238ca1628fa449a169846155b2106bf7e2426642dd7e1c7fff8749fab63f91c530c89c6f4ba5d875d28f51049d128d7d8014c7eba06d78d
-
SSDEEP
96:1hJtNj1Bq6gMXoPtwZGT3CQJFandwErtlKD9I4mNN:f7NjjPloVQGT3zFaGzI4iN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4224 msedge.exe 4224 msedge.exe 2712 msedge.exe 2712 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 4848 2712 msedge.exe 84 PID 2712 wrote to memory of 4848 2712 msedge.exe 84 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4916 2712 msedge.exe 85 PID 2712 wrote to memory of 4224 2712 msedge.exe 86 PID 2712 wrote to memory of 4224 2712 msedge.exe 86 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87 PID 2712 wrote to memory of 5028 2712 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\html.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab34b46f8,0x7ffab34b4708,0x7ffab34b47182⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3040 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2616 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16553150768006195484,3002528905756761738,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
188B
MD59e60751db3c2c5b6a54f6cb18f9a387e
SHA1c3815742501bd3eb5456958d253c57fa48f14451
SHA256376006f8fffee91ede6e6367fc46a81ad97568e59ede6bfdc1aba6420294d6d1
SHA512e25d565bc4a56dcdb10bb2eb9daf4b031746652cfa55658f35331bc72b0dce59861fbb0a3923857a0382e1b0ef6f38022b13f34e84133567f37872738b12aa96
-
Filesize
5KB
MD582b9a0dc4e35be2306b57e3ad777409a
SHA13fb05f5d89b9e1de13a3e41a9b3983790176ddb1
SHA2562ce98638d73da1ccebfea8cc1c3226e07b45c7b4685b56b1b1ba40064d12c05f
SHA5129a0644687282402837c5a55254bee933dc58d85f794d5f5198b72b487a01ad89fd8ed651dbccd50873026386b765fa454ad43b05919d0e6c78eecb4713b57aec
-
Filesize
6KB
MD5f7006837481c799be0898f71f089bd73
SHA1291cdfd838539c94b409e4bfa05e20dbc14b0287
SHA256c8eb030baede7c9e941a3ebe93006221f345e43dcbfd3b16d4896337a97f47fd
SHA5128e3d5666d1f1b2e4b4f9baf1283f2a0c9c2f9c1c0133e1a32f214dd7e167c2feed37190010d5a1b3e4fc5ffd289d9e485e9c92a6e7560e6de98f08a32ab9a233
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c89570f13fabcb622513a64a7f95bc98
SHA1586f7bd4dd3ee22190306e5b641b8c50f8658eac
SHA25655eabe28fe6b23e8ecb78bb61e2f71bddf13ffe19df86e751c0f5a0a98d51475
SHA5125f620150bbe4ba5c592470f6e917e8168e7b95f0f769c3385140c1f39544ccbebb4c46ea1a79cd5f79b3abb43a4d33ab6471b9d3a4dd86c9f13dc32d4006e516