Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
archive_browser.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
archive_browser.html
Resource
win10v2004-20240802-en
General
-
Target
archive_browser.html
-
Size
741KB
-
MD5
584b1b233d50ab80a73819dbe8e9854c
-
SHA1
c6d658bffab7ef8455f3d1df3a2975fbaccc795e
-
SHA256
b215cd2ad7644099f3902715ffe274f65849cd6a363f205e2a2ea00c261062a3
-
SHA512
793844ee439062f290e1351cc4d81360c36c6e092fd88337834775f1dc1a1189bbafb70a4eff907125948530e7d985fe92adfaaa0ce1014b986c8e037f4f2bb7
-
SSDEEP
12288:DuM2ywRuI368piPekCT9w3VHyshG87cmNH/ofzW5kaERf6Y+xlweQkWyiyNBZmBH:iB368piP9CTiglhHKlTzFtP9XM9rlGu3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1860 msedge.exe 1860 msedge.exe 4456 identity_helper.exe 4456 identity_helper.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2052 1860 msedge.exe 83 PID 1860 wrote to memory of 2052 1860 msedge.exe 83 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 2004 1860 msedge.exe 84 PID 1860 wrote to memory of 1128 1860 msedge.exe 85 PID 1860 wrote to memory of 1128 1860 msedge.exe 85 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86 PID 1860 wrote to memory of 4736 1860 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\archive_browser.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2ffd46f8,0x7ffd2ffd4708,0x7ffd2ffd47182⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7657320761750091086,2970345471628377662,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4b4a66ef-1cb4-43f0-81dd-4cb118694710.tmp
Filesize6KB
MD5ad407e1b76774eaed8e0f5a7fe1e1690
SHA137d85cbbc04b0ecb2e2efd443353019a471ed3cc
SHA256d6265a7bf01a876c8b9f6b7ace13791d5ac36aab00425b363cf8beb0b5d7f6da
SHA5127bb1088e5b91fe09918f2d188041644a631f49fef3af919570195fee641e4b9f44042e74838eeb91900257ff978ddd91ef19c20d020ad89ffe074e887b5986fb
-
Filesize
5KB
MD58bdd68eec99300d693ed4b903a93ff77
SHA1d8a097bdafefa4cfe011a43c685c5e273ad305cc
SHA256cf1c2790c053f0bd4f3b03c6b06cfe7e8302d40acc42a846e58c83dcfc0479ec
SHA512517e680021ec6164321e321139ebe27e603c748ab97a453786dae1c6c18756222fe917a059a581dac360e82d274c170728a6878ed2ef37b539ec246eda3c4e70
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c6638085fab8d8ded27a0ef021119a08
SHA16c56d06747e21736323f27546e7bd0b171bca61d
SHA256b8e2e5f4106bea8b70d395aaa8989f2bfc42f804fa2257f1ac9a0216735f06af
SHA512713abbca7e6f5204cbdd1fbd9baf12d5ce78858320a3e0fde4480a576c02feeeb8e56be088296e56423fd65a875266cd9134fc89ff3d066de0a3c576d215a0b9