Resubmissions
29/08/2024, 13:36
240829-qwg51sthlc 3Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
trial_vegaspro20_dlm_z72jp2.html
Resource
win10v2004-20240802-en
General
-
Target
trial_vegaspro20_dlm_z72jp2.html
-
Size
7KB
-
MD5
7f17245525e5d54fba7bf3ff784a9d4a
-
SHA1
dbdf9610cd567b9eca217f6ef47d38271d619e74
-
SHA256
f7dfcf15db88642b88dfb2092a8034022d93c58ddd6326b965f5f4e7677371cb
-
SHA512
45d097cd909421413fa22c1d234f9d0a266b321060e00fc7fbd6dc5561fbf23ee2240ecb716390bbf08e5ccc4723640f1f7430b479e7ebbc525d229b39a62375
-
SSDEEP
96:pIm1m0Myh8xR202xWUNlAKU1Mu9urvIFuHO2PrpQH3DQo:/m01h8xR2028UNlrju9urwoOgCDz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 4124 msedge.exe 4124 msedge.exe 4904 identity_helper.exe 4904 identity_helper.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4312 4124 msedge.exe 85 PID 4124 wrote to memory of 4312 4124 msedge.exe 85 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 5020 4124 msedge.exe 86 PID 4124 wrote to memory of 3492 4124 msedge.exe 87 PID 4124 wrote to memory of 3492 4124 msedge.exe 87 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88 PID 4124 wrote to memory of 4828 4124 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\trial_vegaspro20_dlm_z72jp2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80f3646f8,0x7ff80f364708,0x7ff80f3647182⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2624 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,18179131331153239799,9931601973904217781,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5dc81b0f2b10c149bc85f59680157f128
SHA1f8b8101200c3465362fccbcdcaef436a90db22a0
SHA25649d27c415c799026496c69ec38aacd812c53edf3eb8e222e87342c9a3095ffb5
SHA5128f4c5b2d066e0d37c06474647dfe73138133dddf4f0bd72c3cce4ad7be1e65f3edf144d823857bb3a93d4c8bd8fb1e99ceba11806a66445db176f208351546fa
-
Filesize
1KB
MD5d7d1573f36c87213a7a8f5e39b8d7e48
SHA1ef444d6bfa6025aa06535fe1dcdd751f902fd0ed
SHA256a9330c0aad2590ddc8d20e874ec2af0bfdb9aeab2fca31cb8014dc82df5873a4
SHA512c79239bd816638e87e1ea3b0ae48f2c6119041a3371002916563f843caf029434dd27ee48348e0ef82994de2f4f868f1edb3bbea62ab17153ecc6faf16a66ebb
-
Filesize
5KB
MD5baeb7a5723735dabf440c3f3fa094269
SHA1c1a33658d964626972a8820051ea27c1bc1c5fc4
SHA25672213f3c1b96cff62c804a7f8f7c16c0e5e5803858934d43e35996c843edcff6
SHA512ce401be20db871dc40888c6fd885bdde1247396d1543206442c6c3c1200365c737e1815482bf91e6e0eac4bf0bbb8525a3011a5e20b731da3b7e5f1d31ee6d5f
-
Filesize
6KB
MD52e6f09efd4d5d4c2da610ba9ed8dbd34
SHA15c1bdcf71dc4f937e712016f43ee0189a3a65cc3
SHA2568e98f7eb89142cbdf830f0f13f835217ea54b3f8af797a56ba5ef0a5272b4431
SHA5128ffdeb42b0b8016942dfd2223f972c37322031d16b9aaef28c8dabe0f0ba4299e204c53c0be27fb7f6c6351698c0d2ed53fc20d4e7cce7b7207dd0fcd4e63850
-
Filesize
6KB
MD51632888c1b4263a1a90e50b135d1d5f0
SHA18339f9b44122f17148e512871ffb43f6605e2253
SHA2568e6ec6e96801d640bd3d571ce0b00a68457ae90293c463bec7f56128cf5e0169
SHA512a2c1c5f040b8cde768ddeffc971534ca6f50b91f0c19f3d4ef36f6c45f38940b84aa58e3d623ff4972dc99b073f018266be4c2f52cb54d11e632129808594dae
-
Filesize
706B
MD564fe9700008234b5bd66a909fde46d2e
SHA1c8a081f2c1f0c329c6ab88d1845917f07c3b5e84
SHA2568c67b74b0c1318bc56d2292b7cc702de7437164b986cec77d6233c73bd49fe42
SHA5120baee4101eb1cb7a261ea03ec6990ba3a58abb2511e83608352a230bad5af8c0424f128571e85e000d39a9c9d408ef818e7cce933ee526b79e14b01a091edd9c
-
Filesize
706B
MD5bbbebb2389519c03664f8a1d1d08ac7a
SHA14d2ea71996813a3632c29033decf9dba2a1a0138
SHA2567f22ca13be90a6b5bf19723cb0afca6171cc8ca15a3092efce8bd62617cb67f3
SHA512b7620c95b882068d07434ca1deb1a867a92eddfededa3f2969a32d73d8a0edca166571eee24adbaa83671ba6f4f3d3cb9f0cf41ea48eb3468dc4daa88e5ea71b
-
Filesize
370B
MD5811a4efc0d18c2a439f43cf6ad9b1301
SHA17f9455a15d26c558b9552f67ed2a216ffe348084
SHA2560788e39f0c1c3e3b43994f58e2172360b916dad845e743f0ca364a5bdf89a292
SHA5125b242ed023f82bb419a6ca8aede4bcbe662ae79c4b4e7ea68288bd219dbeb2c6aa002eb9d83df047c083a0c445b789f1ca85c5c92626c31e3f53781319f3a094
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58ce98f6f41bd85c6f5a9e9adfca1570c
SHA179981240e800556fc5ef2cb70add22a3db301756
SHA25636c5a93454d00ead047e12fafa229154bdd23ff6a48a57b71278421e88d1c0e4
SHA51245d37169d84325e333a8e1a1f9dcd04d6fdc43a3244bee569c8c509099c0385cf22d97982d557281eefd7bb1d96cefc064f8786736c2657a3657e2e4ed983ffa