Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3028 msedge.exe 3028 msedge.exe 756 msedge.exe 756 msedge.exe 1432 identity_helper.exe 1432 identity_helper.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 756 wrote to memory of 3848 756 msedge.exe msedge.exe PID 756 wrote to memory of 3848 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3576 756 msedge.exe msedge.exe PID 756 wrote to memory of 3028 756 msedge.exe msedge.exe PID 756 wrote to memory of 3028 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe PID 756 wrote to memory of 2164 756 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe955646f8,0x7ffe95564708,0x7ffe955647182⤵PID:3848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3576
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:2164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:3992
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6770882198655072944,2408110833597618896,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD50fe7bb96013a381bef246ed7ab6dbd72
SHA1b9aceec716977a4967b43cd67e9c598324e76d22
SHA2562655069ec9a37855d3b068dcacd8865a56c388771ab99133b9d03e8df0a7797e
SHA512efddcf59b33cbecdd83caaab665702c48c71a6f65d89933e86ae69b58885df2666018ae5da9f0e8e6461bd3707c32e06586520f4019154f3f4af5bd4f11ca0d3
-
Filesize
6KB
MD53239f973370db4f888a533293a2ced85
SHA119c915976a104ebd9f316d13ddf7968f45d06fb7
SHA2567ec74c54980cfbfcc75ca10c641320794fe056ee3bea1c9e16c42336db919f24
SHA512d9a42374d2edb71c8bf7ad0e18a21dcda50b253fcb357339f56df57d44529eb6e0401950664ede175ae700e1c56950a14b11bd2063e421dcbc90bf198d0575ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b03201628f03a7fe5c0c2fcf8e610997
SHA186795057f76e30ab2ab7bb7be8b767f358f1146b
SHA256c9f5fb6c5e951245f98696c616fc9792be60d3e3e50bc30392a070124902833d
SHA5124cf89ffea00f668600a6cd1a2288ef4e52c3399939f72092fc61258f278bb471a13a4ff74b3ec3f639256c15ee2c1f68472850b855327227f9e686e0905bd2b4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e