Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
ca1888dd249557d76e467947869b2d30f0f2feda2ea16913700b8ae43603949d.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ca1888dd249557d76e467947869b2d30f0f2feda2ea16913700b8ae43603949d.html
Resource
win10v2004-20240802-en
General
-
Target
ca1888dd249557d76e467947869b2d30f0f2feda2ea16913700b8ae43603949d.html
-
Size
78KB
-
MD5
42bd31d770a939c1c4cea1e1b7e87e5d
-
SHA1
d593cabfe21c4c0650aa2e188f370103d0f4387c
-
SHA256
ca1888dd249557d76e467947869b2d30f0f2feda2ea16913700b8ae43603949d
-
SHA512
5bda4d868e7a97054f0ae5c31378faf3abe98404f1f019e9bf4081fe48c8b9411a7186e477162c6e7c0933991c861c8acb6c7b24726631ea81894cf5ae33c904
-
SSDEEP
1536:ktPip+js1DYptUNiD4D3nBoW0+DNS0SzW2CjRgYyQ7:ktvj4YjUNiD4D3nBoW0mNS0S6bjRgYy6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 740 msedge.exe 740 msedge.exe 4072 msedge.exe 4072 msedge.exe 2916 identity_helper.exe 2916 identity_helper.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4072 wrote to memory of 756 4072 msedge.exe 83 PID 4072 wrote to memory of 756 4072 msedge.exe 83 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 3700 4072 msedge.exe 84 PID 4072 wrote to memory of 740 4072 msedge.exe 85 PID 4072 wrote to memory of 740 4072 msedge.exe 85 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86 PID 4072 wrote to memory of 792 4072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ca1888dd249557d76e467947869b2d30f0f2feda2ea16913700b8ae43603949d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdd6546f8,0x7ffcdd654708,0x7ffcdd6547182⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,5929431301996579899,14792730975018203853,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
996B
MD54130f1f099816ffe1699c4bd5c84d3f4
SHA167e017129b288dae9d04a8724089834b80adf482
SHA256f16d4894419368b0a2c598f3176cefb562993fbb60e75b8b285f88f6c84269aa
SHA512ea3910ba81e08c19db4f1439ea085f3124ab28262f1172a81fcb32f9fe6248f290a114429c06c223387c8dcf3bc75802152fdc9a03ab37df863eec12c5ec70fb
-
Filesize
5KB
MD5d07ad71d8b57b7e26fbc2e21fcd8e42e
SHA15e927d0aa9340ad1095f428b1f04e105c55530ef
SHA2564c63c2228ef02f6100eeb2414492b1b15fb0c2b68a01810d8ca1684885edce45
SHA51253b19288a307ce9869e26fc04fe4e7f28b16c6982025d25d67d04fa93f2fd8bf7f5d25d9c6bd0176be722b07cdadc26300f1897b5a757575ef1f5fcda9282a7a
-
Filesize
6KB
MD5f1937354f393eb091644f226251fd6f7
SHA1fa839ea8d8f99d2f76c1aad33a0d37c49a8e1b5c
SHA256d3e69abdf2ad5321d1e7feb9f745966df3c4572235a5ffa120782d9c10456e79
SHA512a3dcc37405771b43f98264ebc4979ac763847f9d8a4a9d17fac2e46b5ea328e8be7c8d64e927b35fea308a93dc2792cd06f2f58ad47ccf268700ee2fbd0988eb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ebde5ef73cc46887bd87807f88a2fed3
SHA178cf4e1c4a63c26eb207ac63f54ac69909a764ee
SHA2561a56287565591b3bb85cc0f5c56a3ab107efab4b19106d730c961846c661fb00
SHA512dbe1fa9ece5a60f583656402357827891fb9f72622b7f8b4f85520b3926d6b88d5fd98daaece88bafe2657a458618f15c678f1ff5500a1f24a97bb752e9f3102