Overview
overview
3Static
static
1bluhell_fi...tb.zip
windows7-x64
1bluhell_fi...tb.zip
windows10-2004-x64
1META-INF/manifest.mf
windows7-x64
3META-INF/manifest.mf
windows10-2004-x64
3META-INF/mozilla.rsa
windows7-x64
3META-INF/mozilla.rsa
windows10-2004-x64
3META-INF/mozilla.sf
windows7-x64
3META-INF/mozilla.sf
windows10-2004-x64
3blocked.html
windows7-x64
3blocked.html
windows10-2004-x64
3bootstrap.js
windows7-x64
3bootstrap.js
windows10-2004-x64
3content.js
windows7-x64
3content.js
windows10-2004-x64
3icon.png
windows7-x64
3icon.png
windows10-2004-x64
3icon16.png
windows7-x64
3icon16.png
windows10-2004-x64
3icon16n.png
windows7-x64
3icon16n.png
windows10-2004-x64
3icon32.png
windows7-x64
3icon32.png
windows10-2004-x64
3icon32n.png
windows7-x64
3icon32n.png
windows10-2004-x64
3install.xml
windows7-x64
3install.xml
windows10-2004-x64
1Analysis
-
max time kernel
50s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
bluhell_firewall-2.6.4-an+fx+sm+tb.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bluhell_firewall-2.6.4-an+fx+sm+tb.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
META-INF/manifest.mf
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
META-INF/manifest.mf
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
META-INF/mozilla.rsa
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
META-INF/mozilla.rsa
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
META-INF/mozilla.sf
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
META-INF/mozilla.sf
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
blocked.html
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
blocked.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
bootstrap.js
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
bootstrap.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
content.js
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
content.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
icon.png
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
icon.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
icon16.png
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
icon16.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
icon16n.png
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
icon16n.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
icon32.png
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
icon32.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
icon32n.png
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
icon32n.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
install.xml
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
install.xml
Resource
win10v2004-20240802-en
General
-
Target
blocked.html
-
Size
3KB
-
MD5
e4a0e69d5a9ee6098eef66ee9abe1b6c
-
SHA1
78f354526e093292097206f426735f45b1a5b6b0
-
SHA256
4c600fd0dc3c33b572853ea56549928041d020041059862678edb05df02ef9da
-
SHA512
6136e4eaae64b40928aee04be2d667c7e032b90de1482a8451a091e33ba134bf0df008807fcb38bb25ec7d298376e45e09a9f93e526a77ea8bdfa4f0cdf66a96
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2616 msedge.exe 2616 msedge.exe 1624 identity_helper.exe 1624 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 224 2616 msedge.exe 83 PID 2616 wrote to memory of 224 2616 msedge.exe 83 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 1400 2616 msedge.exe 84 PID 2616 wrote to memory of 2540 2616 msedge.exe 85 PID 2616 wrote to memory of 2540 2616 msedge.exe 85 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86 PID 2616 wrote to memory of 4904 2616 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\blocked.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd42d46f8,0x7ffbd42d4708,0x7ffbd42d47182⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11417322802816241040,5719233976453253265,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
5KB
MD5cc88b392ea10a55bcd59cb4b45ae8229
SHA172639253551149d8a4f58dd3ae29921facfe4d52
SHA2564da44ffdc18a4ffda2a5f0ce0391032c8f2378b9af6efe38733a0e1677a598de
SHA5129df0eb98ceca9b561cfbc3d5d3841942cfc5ba03de771a8833b0ccb1e3a1bb7a939a3bc9b6b3d32bbe049643f07a86d5eaced02eba982911accc2e78c3767049
-
Filesize
6KB
MD5d4fd38fe151d96e8b0f0bf4626419870
SHA121087e84527c72be54497f7db63e9f34908ad4e0
SHA256e0e0f76637b153e667ecd37f23adcf46833ff6832969c4d0836c81739d10c43c
SHA512b7b6caaab44182a482d2fab6cecaba7c798de09e0150b3a0ed28499980b345da50fc23295df64fc70b2f278738b4df32c2ed51d73ed1421613cccebc07fb206b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD530d7cc072ed18506973ae95ac82b9112
SHA1c400c5cbb2b877addb8ca0f0ce7271287f5c9f94
SHA256414868f018b83f213bd868c82924f26ed8796a4369d2af60230a5ed0be1681e5
SHA51254cc8bfda781c63e4db915165ad9caf4db4fe0a5ecef41c3b68b208c3daeed9eb8f5de9c22a928f054026442ef3546efe5594f2dc80840d02ce96bffd90acbbf