Analysis
-
max time kernel
244s -
max time network
244s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
idc-business-value-red-hat-solutions-compared-to-unpaid.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
idc-business-value-red-hat-solutions-compared-to-unpaid.html
Resource
win10v2004-20240802-en
General
-
Target
idc-business-value-red-hat-solutions-compared-to-unpaid.html
-
Size
128KB
-
MD5
3652fc5dca48b821e0ee57517f3b45e6
-
SHA1
c830b1a08c3c5f46b64aaea378b76b991d07219c
-
SHA256
fad026e9e791232b9baac7984aa1b647a2202440f23ccf7dc5a0e709d5662198
-
SHA512
05cb75892e9ac1ed866352c59ba54ddabb8cd6e57457bec147c9fd44278496fa6dd94facc68ef6c81943d89139b7ba2277f43da8f7bf5769b7007ce0011778ae
-
SSDEEP
1536:nZcJ7U1lve4c4ZEv7vOifMhQAWLD7/HcrvXOpmcbhrFUrrHF0rxx7:Q7UD25UEv743r+mcbhrWrrHmrxN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 2700 msedge.exe 2700 msedge.exe 2904 identity_helper.exe 2904 identity_helper.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1512 2700 msedge.exe 85 PID 2700 wrote to memory of 1512 2700 msedge.exe 85 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 864 2700 msedge.exe 86 PID 2700 wrote to memory of 3964 2700 msedge.exe 87 PID 2700 wrote to memory of 3964 2700 msedge.exe 87 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88 PID 2700 wrote to memory of 4928 2700 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\idc-business-value-red-hat-solutions-compared-to-unpaid.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb91946f8,0x7ffeb9194708,0x7ffeb91947182⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13999336769938193331,5370349764697079306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD50553f870c32bc54a5300fdc164a49bba
SHA1e6305ee1b8134972f755e39861507147768c1c04
SHA256b47d2fcfe41f274bc87feb3eda792e189a7aa308c3045d5718f6cb56d88e7660
SHA5129746f119d9ff806dbbc52bc3a9b657670c864681d51e4e6e25a90c8e4d19af90a8897c68a89d9120698d41ddd895258cb48e3dca535e9a05799009e06c2ec1cc
-
Filesize
652B
MD5718133b6d3e97bf2f919df23fdc6f821
SHA1ef4175b26724a0ec51f9e09c2ed42f44ea6df79c
SHA256278476fb4ed09517b193b5d5492b83bb250c9751b10f2a20f3f8d6a2e9da2268
SHA51241123125dd930ad52f1728738a56b4e2564de85ec6f23d89c794e1e79e5e028b94e36c938a2224e16ec789f5eadc42ad905539628d62905c973e43448a4e4ccd
-
Filesize
6KB
MD5509f6d653b40fe350d17938ad3a71e7e
SHA1381a4ce756d5e9d7c03c5be2aa24f5497fb85a1c
SHA256cd669868e1939fe2f14a50926fc25aeeebfc9c019b380fdd6345d7b5e795ad95
SHA5125eba7f944e7e09f0b93a59bb9f794b8626d2fa6a667f77b2bc4312f4bbda194660a02f7746bdff3d87a7a21cba84123623e8112dd20cd7129422e63dbf557886
-
Filesize
6KB
MD583e5a9778c38807764c94cb7f9a3f23b
SHA1cd3252cc6365e1a73fa92f0563fc98c85c03c6b0
SHA256cf0f3114cfcba14dd1e4f14d64965c0e90ef5b040a37c05d1bb7093502353569
SHA512e2bc1680a6c8962bf6086eacf473e14863cda446285821552257e6ea31dead7ab402fe13ac173156dde663c85a3f3c289ea35d674093e2616ffb86a954a644c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5007323ca99a349d3feda16020a8969f4
SHA1223c36359878a584b459959a65f100c91219becf
SHA256372546944cc779bded9f730abc9bb9155e93dbaf6885e13fad218e414f365e60
SHA512b94905c9b459bee955fffcb45e7a1434b3c4cc98da53a12e7e75a57e15ad4a781d20194db3e2cd53390b8b3137aa8f807f3729f4600766543eb9d641a410b2fe