Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
8b64ea3c9d82bcff7883c86dc3058b094434a34c8bafc8a87a69df821c37ea53.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b64ea3c9d82bcff7883c86dc3058b094434a34c8bafc8a87a69df821c37ea53.html
Resource
win10v2004-20240802-en
General
-
Target
8b64ea3c9d82bcff7883c86dc3058b094434a34c8bafc8a87a69df821c37ea53.html
-
Size
83KB
-
MD5
e985cf67419b408014a832ccc416fff7
-
SHA1
fac99ae8f3e239196f3a27f212e79f08e5bd0106
-
SHA256
8b64ea3c9d82bcff7883c86dc3058b094434a34c8bafc8a87a69df821c37ea53
-
SHA512
14b53dd95d0ed62e714ee1f1711e771e4af1b83703251a0f12a2d660c7ceb8648211d8169f388a202dbb1a535d484eb46a9fcf2de2d05feb67042f9b97c29aac
-
SSDEEP
1536:NxQI9bSUZGQx0NcNtxNSNeNBNYNoNJNbN8ESQ:NxT9bSU70NcNtxNSNeNBNYNoNJNbN8I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 1036 msedge.exe 1036 msedge.exe 2552 identity_helper.exe 2552 identity_helper.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1036 wrote to memory of 1912 1036 msedge.exe 86 PID 1036 wrote to memory of 1912 1036 msedge.exe 86 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 5100 1036 msedge.exe 87 PID 1036 wrote to memory of 2716 1036 msedge.exe 88 PID 1036 wrote to memory of 2716 1036 msedge.exe 88 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89 PID 1036 wrote to memory of 1464 1036 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b64ea3c9d82bcff7883c86dc3058b094434a34c8bafc8a87a69df821c37ea53.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2b9046f8,0x7ffb2b904708,0x7ffb2b9047182⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,13569162930802528270,1073695302076265697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5512 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
741B
MD5ae218e0f42f5381b9d3a4e11bfe16764
SHA1797fa3498dc6f67058e3efcf9c7e47c38051d648
SHA256c589534c0d7934e21f29ffb1f54308672453d61e21d6d73761b06a46c42056ad
SHA512d2664df3e56ca3a7f1d8c47e67338e362a16d0361a3f9e273cfa4b13d35e04d502b8fb1d74da50472bdb8bc9704bbcbbfb43aa19524307da6f3b6bfa480a5bd5
-
Filesize
6KB
MD52d70ae8b4bc4e80edafc44bebe0201aa
SHA1ab5f7ef887a5bc1dd964d4b436bf2570afe4a016
SHA2563f3d927c307e3644dfa572a3a47dcdbf64c828f0163bea45bda6bbae595d99b7
SHA51269f2d3db59ed8611cb79749d2f72362ce332923eefd458f5bde538ff05cba983a0e3f3b190cffd9263cc3e12b4826961fd8d9c93d76cbe458e7f5c579f6851d2
-
Filesize
6KB
MD5dfe228bc6be507acc6abb71cf19f0cab
SHA1213f1867e3afc48282802a7c38330481922c2bb7
SHA256884ad100d95dddc21cc5e028d645d8de01206e84dcaf8aa36ad3403f67c7afba
SHA512df8075e61037813929d40947323033be59a3a964936414ed50470acf08385017b99d39486b64bdf672252d205fb83d8df05b027fb7e0c8b68b61d57fba54fcbd
-
Filesize
6KB
MD5c8bf7d65e61e833ac6ab3be74368bc39
SHA13c6fde76aaa83eae2073de6b663b9b4818aa77f5
SHA256e87857c62e8f75d8cd52be922d5a91f8efa46cd75780f9342e71dad7e7539483
SHA512855c2c331017b6a52b9830051961dc481ad212932743cd0fb2d32a9a81f7e833d1768a48f514e12801ff6054f1ed4e638fbb7afde3a3b8c8d455455a682bb11d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD570d68cb3c314ac8144cf3c15e3bbad15
SHA157738192c53e5b618ef48019a7c79d4acdb83fef
SHA256789a06af4a5899936049714728b87e6484b9c0ee6ca02615eb882bf86f64feb6
SHA5122ef71a283681019d1c3822addbd415d25a762fa6880e556858b809b01b3dd30c46351e9d25b3e66122464fa5e26542b2cd8487e2dde96c32960e05ca2de4990c