Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
23a375470583ee7cf3ab9a8d066f8480N.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
23a375470583ee7cf3ab9a8d066f8480N.html
Resource
win10v2004-20240802-en
General
-
Target
23a375470583ee7cf3ab9a8d066f8480N.html
-
Size
37KB
-
MD5
23a375470583ee7cf3ab9a8d066f8480
-
SHA1
9ef61a13141370b599f1f62cc3597b1bc16ef0d2
-
SHA256
9ebdc46507f5b4ff73c2f11328c55a33c65187eb1488b8ca366c76792cc0ed21
-
SHA512
d2058d53700978f8c2f52692709e33a4746060f63fd3cea7c8ac661e3153aa270fcff52ca0725c3f037bbd2a80b9ea717a7abe38bc163e04a726ea21f6d7d469
-
SSDEEP
768:snsIRIOITIwIgIWKZgNDfIwIGI5I0J7SAIRIOITIwIgIHKZgNDfIwIGI5ITJ7SC3:XIRIOITIwIgIWKZgNDfIwIGI5I0J7SA6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 3428 msedge.exe 3428 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3428 wrote to memory of 4664 3428 msedge.exe 85 PID 3428 wrote to memory of 4664 3428 msedge.exe 85 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3732 3428 msedge.exe 86 PID 3428 wrote to memory of 3976 3428 msedge.exe 87 PID 3428 wrote to memory of 3976 3428 msedge.exe 87 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88 PID 3428 wrote to memory of 4644 3428 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\23a375470583ee7cf3ab9a8d066f8480N.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae58a46f8,0x7ffae58a4708,0x7ffae58a47182⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1492,6318839061909446460,2960303686993870379,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:2044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
32KB
MD5dbe6d76a95111c0c2a8b89478258c95e
SHA1f0d5b7f5e30fa6df6eee51aed1241ccae78259f2
SHA25646bfe88f740dbeed005c2f4c36ed51aa7347e90c55d07c5e3167f903fff4d1b0
SHA51225f819705955dbdb3d44591850d8a7a21603fd2e76b9010e50026c74386ce26e5b6ae52e229f80be2b47a95f54e05cc0dee2339cadd3c9a32b034adfc5f4fafe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5fb0ea9fc027317f96c17278b1745f286
SHA1e5e6f02cd84aeb95e02871387dcc3f7983239678
SHA2565159308384081042eb77fb8fb4cca8167f735d3e432f2c32c014f30034764505
SHA51207300f2d3029c286084f0350ffe25a2dc86a5e401ba96fad989eb1b25f5a621b734c724e141b43b621bdde1a8b361c275e5cef73fbab01e368cd8bff0e5df722
-
Filesize
2KB
MD51cb4e2d35ae09c86b9ddd00431172628
SHA111a5171d8a6c28d7ea2902020ec7bf75157a7c51
SHA256dc9e58374c765df07a2077ea767b45f1eea84ace32f454849d797a08546dd9d1
SHA512620242fdf9f79e7377909040e50979d0ed6051ced7939121d0b0bca7dcb1d0b6ea16a2fc70d7e47801e2d8ee6e3400a2b870f8dc19ae555ae32424b1bc27eb51
-
Filesize
5KB
MD5349942a437be4b83d3739c814d7f2ce6
SHA1f24a04b5e81641439e3cddd9ca5d533a5aff86c0
SHA25645df9544af834b3227a9cf2cb6e5ae01fea5dc917316c53f9bfd15aa38704aad
SHA512405109abfa2117883813ea0537e5582b06bc1417cbcad3b351330aa96d5c6253fff59bf87d680ec992287abad959daa06c5edfddadb09a271877deb387a52280
-
Filesize
7KB
MD59ccf19fa8674a2e7f86e0aefbe759282
SHA1e4809753b477d469faab772ecf87d12fb3314dbb
SHA256aedb977b667984dc7bc0e90319c584b78363123ff80a2e922055017a3355d7ef
SHA512fa592aa9bf27761d6406b15f56c7676c836cc18338423972ab7ee1d0407c20a2a2657b6a4cbf10747dbf2befcad9a735eff1d6fa68e39745fadc726a76a6f231
-
Filesize
6KB
MD54d10db34ccace629e0fbfbd819f9b7e7
SHA16411c7ee30146564efebf545ef963756a1f4f2ff
SHA25632e2f1e39d7a57d1824c2f80d4d4ae8a2b3f28f12f631abe635a7fd8b9ffb10a
SHA51281ed9d1baadd35be2e961446072f34d67659f950fd0de30620106b5d2c2df430f134b5c10abffc3d39767bbbdc711a52730f0413aed8b3fea7304c4508d47c81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50347f9d641a307162f725ed33aea9ac9
SHA12683beae97cca6efd6d3475f179a2404edd8fb58
SHA256b990256d5aa7c02651fc7d4cd62c1b7ed9adeee57095da65a28d6530f5cc2c10
SHA512e45615660b4d7cc13339067d04523cbc77abf92bdf5383290ade78a512f1fd0b538641997f2f7293f9662871242fb958acbe1bb785a9f0535836cbb5f5d84506