Analysis
-
max time kernel
112s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
70071f53b2dad5d69a3091dacb887ff0N.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70071f53b2dad5d69a3091dacb887ff0N.html
Resource
win10v2004-20240802-en
General
-
Target
70071f53b2dad5d69a3091dacb887ff0N.html
-
Size
63KB
-
MD5
70071f53b2dad5d69a3091dacb887ff0
-
SHA1
0a3f57b5f734444d7bef0cf781c3bff7cbfd6135
-
SHA256
3d62fd4c4456ea0854d8b941386fbc1d147533d12ebce5aefe53d89e3306bfa2
-
SHA512
8483390e7d647c9c82dcd3a9f19ba7aaedcb0940f889fd8750ed7750d42010cbfaa4fc7ba016e91527e1c58570972cca45370c3d166c05bae968b4424bea2485
-
SSDEEP
1536:PeGIpBbNYPy2rAtMa6j2STIvh2rAvkRbF:PeGIpBbNmy2rAtB66ST2h2rAvkRbF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 4660 msedge.exe 4660 msedge.exe 4404 identity_helper.exe 4404 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4980 4660 msedge.exe 84 PID 4660 wrote to memory of 4980 4660 msedge.exe 84 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1820 4660 msedge.exe 85 PID 4660 wrote to memory of 1956 4660 msedge.exe 86 PID 4660 wrote to memory of 1956 4660 msedge.exe 86 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87 PID 4660 wrote to memory of 4740 4660 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\70071f53b2dad5d69a3091dacb887ff0N.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed9d146f8,0x7ffed9d14708,0x7ffed9d147182⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5957571331393363256,4247692482347599576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:5200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5ac0f91613882ce889b9723abcc1478cb
SHA14d5f7708b3a149e589b1a48e807ebfaf3bac8248
SHA256f755cae0249a22ac167b292d4d0ae4885eb6dd667602dcce5c0007bb71046b18
SHA51210854816aea6b2c893179b79dd5904c68d861bef6f1bc654296d8e01ac477bd2aa35ab260939eec40af3da42d1e5e5d7a9cffe1a38a27ebbe98cda4cfe461dd5
-
Filesize
2KB
MD54ed3ed47a2428373aaec8cb29d25a491
SHA173b90201461efaddf06b228a672e9902e270e77a
SHA256df83402838cf83c9c73f3039a4e2191da033ae0770020ff9e870c4f3799bda0f
SHA5123ae757f2a107334e8d0c76000e34a9e6ea0d316897066dc9e5f53c52f47f869afcff2836efed1ae7c6849acdd07fdb9c8ca7ba53ca0e91d909918d16203be86d
-
Filesize
5KB
MD53c81c98272d17415f0d649ed5b88781a
SHA1f10a70ca500c72abb429c5dfe1f58ed3bc154e1d
SHA25632ff44f2440ff5ec4e12692be73448750d78d6b7e4a7d5a3ddda5c31052ba17c
SHA51270bd4f8b46b5fa7c8dc90365eb269aabb49a3da7e9dae00ea4f0e43a14c1d78d5e705efacbba2d1f9c80ef40f6a446d5d61c60873a55ef37e14f82720734268c
-
Filesize
7KB
MD53eb3f661f198e0731803494ede6ade06
SHA143e7af8f1bf6ff2a2acbc08156059d21771854d6
SHA2568877a01a700ffb74fbb6b6b278f9dee3db9265b3215b6664882d8b189ffaf2d7
SHA51222421857ff85e61b1c42e33f2c6ed6bae41eab7a7cc3c91c2ac9e18f093490e434dc0c7699136ff483d6abe1fead1a146b0be65e21600b6aa7acfae62e719f90
-
Filesize
6KB
MD5ba433f2a5e1e80797416df1843498463
SHA188e92c65e088738bf5f80e0a22e5ff8c5486c181
SHA256245429ab8883d9a302134239fba6e8dd47ae78825b49398a35e77f4b1810fe37
SHA51262c5112b75a980080ba92ed8938b38fca0399fc4297a23205724853753a4a27d9258fb854fff15b6152f9b5e1869ff1c19802da6abc5909d40bac617c4048f68
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD58ccf9fb690f017943af28d1b9397c4df
SHA18fd25b12917c4fd022d68ea241169e357396c922
SHA256420e91065243da482a88dcb02749ea00750485ddfd1ae567d31827dc420d71e4
SHA51228c53e658ef5d057a98cc136c2984096a1712f10748ff998cab2e8bc645c5c02b66eb5e937a2e66e5d6b46095a437c9b48b1e5c98c0c3e8b94d2baee8ec831f0