Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
d9f91f08bd902fe8f4808279c1c45edbb1c5700594024be80efa4cd3c1ae646d.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9f91f08bd902fe8f4808279c1c45edbb1c5700594024be80efa4cd3c1ae646d.html
Resource
win10v2004-20240802-en
General
-
Target
d9f91f08bd902fe8f4808279c1c45edbb1c5700594024be80efa4cd3c1ae646d.html
-
Size
62KB
-
MD5
91686eafa5d3d7d9d1375dcef6f17b08
-
SHA1
f26a3f3490c86cfae1090ba07301f46a0cdaebc7
-
SHA256
d9f91f08bd902fe8f4808279c1c45edbb1c5700594024be80efa4cd3c1ae646d
-
SHA512
ead33809121111974dd7f5061b22f96632e555b28070368622824842ca9ce91eb4642619bcb48ab2cd31fc65aa6dad54dffcb58d9a919db8e93d9713700d57d8
-
SSDEEP
1536:SCbQtUeYWLiHNYQjINe9ZdGVxVA1QnnyIfOGhplZKbbW5cqHR:SCtWLitYQwe9eAolUvqHR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 944 msedge.exe 944 msedge.exe 3880 msedge.exe 3880 msedge.exe 4500 identity_helper.exe 4500 identity_helper.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 3992 3880 msedge.exe 83 PID 3880 wrote to memory of 3992 3880 msedge.exe 83 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 1260 3880 msedge.exe 84 PID 3880 wrote to memory of 944 3880 msedge.exe 85 PID 3880 wrote to memory of 944 3880 msedge.exe 85 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86 PID 3880 wrote to memory of 3592 3880 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d9f91f08bd902fe8f4808279c1c45edbb1c5700594024be80efa4cd3c1ae646d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebc3c46f8,0x7ffebc3c4708,0x7ffebc3c47182⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5837330719159599177,2540127028242586921,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD50f654de65459d0ca4c2939d644c77829
SHA1c7eb1ffc9714d6e840cf9c4a003a4c3cb52998f2
SHA256d0e85f06979397e1695a2aedefa182df65ae4a67923136a4b0f237303dde1d52
SHA512e272b56205ebbea1b2197bc64458c20964f506a9bf412097cc29e7c0cb8141c372083c9cff2b9d45781eaf1690fedde007fc736b265647b65f06b059cab5b693
-
Filesize
823B
MD58924af4580ddba54dd2d3971d7b2d5e0
SHA15b83444cd85a8d7ef41b75a41e52a7d4ca378b33
SHA25607ce7b90bd4fa344dee4d454cb05dedd3715fef409046bf904e05c76926e7fe2
SHA512598360e6c648933023d0f801be254700cac6e43164171e8faf96999566a20e657641deebdb42c311dd5691e3f3421bff25c41abbd53756f2e40f0e1afe56df7e
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD55293800fa9ea0e46464edd8193762c15
SHA18d13817ad0512da301b2f6670c1d5b9c6ab0d6c3
SHA25654259e709f479c049001835906b110462dd9c3f7c4e6da3a87310e86af06b71c
SHA512ae07788a7fd8c762958d9fcc88e31f8fb3cd76d10d3a8e1bf4eac16e9aa09a78a6060880c29e9bb99b7598def33d0faf09c850771613685a93eb8c76c7787f6e
-
Filesize
6KB
MD59397398b270980bc4fbf6cff2d007bb0
SHA1277c6d02fa9653ab7e8ae79a8dc60ae0d4bfde81
SHA256993a4da4458ae29ade26ba3b33d6114f320e4308d0167766858fdaabe7b144fb
SHA512bd85ae82e5ddeff5f2b605eed4d8329ee0de6a1b26caba8a62e184e4fadfcef4013f737d85934a9ce0b85ace5e5a426e84aa2f6cbf3a0ce0b7817f903da83d93
-
Filesize
5KB
MD511b7557e1bffda35678d69390a3e496c
SHA12c9b9224278cb77e10be0470b9e4443615c716f6
SHA256067f648e9c1d88722bee14d2d537f17afc42794b1db4df3dcc5c3d63fecabce5
SHA51248cb7de9d5d6a51d1d01f747c0ec9af81e2a99116b572edc341d0ec6cfcb9e35457fc80813c81b45d006fd9a4ef995e0f6b36278c440d550e9de822f83891542
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5278d8357cbb10c12df8e42a48898506e
SHA12cef9f378d978e882e9b2dfa72159eab6cab8f57
SHA2563280e6c39d390e24911eb825961820ac0e27ca8ee3dbc2f643b46e30bdca70fe
SHA512c7a67088d5b4d0b5d825e32d7af247fcc10c419487761c5ba58b2a60c5f6405e3c3b2af41a1dcf4d2fb6ef134220d2b96aed0732167cb13c37ab92132945c2bf