Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
353b3ec3ff4348084ba62cf432046530de20603ce254431c5f0bec1284685e66.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
353b3ec3ff4348084ba62cf432046530de20603ce254431c5f0bec1284685e66.html
Resource
win10v2004-20240802-en
General
-
Target
353b3ec3ff4348084ba62cf432046530de20603ce254431c5f0bec1284685e66.html
-
Size
66KB
-
MD5
f2ad21bddcdf9668b6b0325e8758a051
-
SHA1
4383f549deb114440ed72dec1f8dc47042e868fc
-
SHA256
353b3ec3ff4348084ba62cf432046530de20603ce254431c5f0bec1284685e66
-
SHA512
4c506a481fa52159c9db4d3fbb584216f3b1156cc8feb2838df582cab3e0d6e6d5aa55690f8dc140422ba442a6c3d3afa5af93f30b87ec82f064da3f9afaaab1
-
SSDEEP
1536:02pY6GWE47ZAbYp6kJM9rCX7CesErsOIAc0BJQA+2tv:XfZAcokG9rCX7CeBsOImBJQA+2tv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1296 msedge.exe 1296 msedge.exe 2304 msedge.exe 2304 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe 2176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 8 2304 msedge.exe 86 PID 2304 wrote to memory of 8 2304 msedge.exe 86 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1524 2304 msedge.exe 87 PID 2304 wrote to memory of 1296 2304 msedge.exe 88 PID 2304 wrote to memory of 1296 2304 msedge.exe 88 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89 PID 2304 wrote to memory of 2612 2304 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\353b3ec3ff4348084ba62cf432046530de20603ce254431c5f0bec1284685e66.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe13ad46f8,0x7ffe13ad4708,0x7ffe13ad47182⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2503553943875374415,4396903864310164828,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2503553943875374415,4396903864310164828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2503553943875374415,4396903864310164828,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2503553943875374415,4396903864310164828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2503553943875374415,4396903864310164828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2503553943875374415,4396903864310164828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2503553943875374415,4396903864310164828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2503553943875374415,4396903864310164828,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
1KB
MD585c0ffe9afa9631fb70f5aeaea599996
SHA172ca576b4f1813525e2f288da315613ceeaed34b
SHA25645f533e7fac6f289bcbc80bb5c069706466a8cb8d084dd13ed578c70bad71a15
SHA512d4a4ad8b0d46651221cdc3b7db603f5fdc994d3486b55c9ae0df2b180073c911569c1e9b165e23bd5a4a7249ab9d992b14b2916819dafa07a7280d920a354a38
-
Filesize
5KB
MD50b84083b658cda1232e08c89be897191
SHA1f35742f87964f44a44bf7d7e3750f71ee903bbeb
SHA256b5516ae8ea940a3624a1ebda6d836e6cbf431dd6b1190e5a5a362926db34ed96
SHA512d006d23699a82c01384e73d49dc982855f371464316a6ca7bb086165aae7722a9b2e0c036dea8befe5666c1181d774938592b521813d3dddc068d1c6658f59b8
-
Filesize
6KB
MD5e08701bfcadd8df9996d892af332eb45
SHA1e3ff290e161bc4cb70a2a0b1ecfd0afff22d9149
SHA256697c4758e49de8735c74e50d7cd814f1f252f20ef91307aa2a107049b00d7eda
SHA5122351ee6dd554b211b8d2bf79cf6588441a972a1d0f035dc907eec16594517c2cbcc990555194a011c88390de87da59699dc81314733c4ca39b5eb7ab73c2847f
-
Filesize
10KB
MD55c0e72fc60b51bbc24da92b413300bf8
SHA10ec27244dbbec43f736d6d60bab00d0199f16841
SHA256c0fb07712ec25719e5aee6e29c1b5178998ee89cb75078db886bbd3d77ffe990
SHA512c8f44d701f9e24be4458348171699e035fc3fdd7e15ca859ba9e1bb37ef266478b6b7f1f4f8abc6f63a216a06cc6fd2add460f413f456fd5d4b6951f7ccd4268