Analysis
-
max time kernel
112s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
fbea95f5f618517c49008348a5fa30afe913796e3130cf5cedf822f28429308dN.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbea95f5f618517c49008348a5fa30afe913796e3130cf5cedf822f28429308dN.html
Resource
win10v2004-20240802-en
General
-
Target
fbea95f5f618517c49008348a5fa30afe913796e3130cf5cedf822f28429308dN.html
-
Size
199KB
-
MD5
e1435c4c7fd278373ecf2a0967b12130
-
SHA1
1e31b8581679fa2fd0e54cbf7097033c644eca57
-
SHA256
fbea95f5f618517c49008348a5fa30afe913796e3130cf5cedf822f28429308d
-
SHA512
08ed25a8d1c5dd1e028222d5b2088ef01f226f0fa43244935288294a5cb268abce00ce8033402c6ca6be71b27d69d61dcc2fe75c986fa92897a8ca4b643520d6
-
SSDEEP
3072:VDhKNwMnorlaGptxc2yjx4j2uX/kcQDU8CuN/paKIo+jocDOFCCG:HKNwMnoro/1PTcQDU8CuN/ZIo+jocDOA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 4860 msedge.exe 4860 msedge.exe 3344 identity_helper.exe 3344 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4784 4860 msedge.exe 82 PID 4860 wrote to memory of 4784 4860 msedge.exe 82 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 3480 4860 msedge.exe 83 PID 4860 wrote to memory of 2652 4860 msedge.exe 84 PID 4860 wrote to memory of 2652 4860 msedge.exe 84 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85 PID 4860 wrote to memory of 3136 4860 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fbea95f5f618517c49008348a5fa30afe913796e3130cf5cedf822f28429308dN.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab34b46f8,0x7ffab34b4708,0x7ffab34b47182⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,8810648809990822309,4683173823039538043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:5052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52c64bc0c4332a162cbbddaed378e7070
SHA12c25441f67c8f9d3fa755c713340b30a1bb0e8cb
SHA256390b2876bb00d42cb8a6b9b6b9a956632a65ebf008c652730e384f2c6985e019
SHA512ddd10bc1ccb355ac6e7433060ed3df90f93574cd6a3b9bd5cfb412dc1839ceba31c8a6a30ba95865045cb32ca8cbad3201ba544bfde1739bd7c454787fb21d64
-
Filesize
1KB
MD510e819af126670ecff84bdab04396acc
SHA105f78d34e866b91312912b9cac4e91a2173ab2c3
SHA256ae78e19a3204df5ed12c6360cc64500a0a04693a6e35eab1c055c68af22a2c1f
SHA512589551259ec4f15179a21e9f3cd38b1ba0734c80ee9be03d05f5af82179eab50f381df8c52b67f099fefbc8e7acd19ffcb391a8fee8504be0f909441336178ce
-
Filesize
5KB
MD515c0547e07a24df4d80bb3280782c382
SHA102f63d2ef14f36a0094cec967d261ff346447d4e
SHA25638fabbaccfdaa2b55ad7ff8804dff68df74132643c2359cfc7a62f6e5cba2b90
SHA512e1f19fe332da263cfbf3287bdad62d7e9b2e0be9387928bb46511eb5566afca05a7d1e8c16c558f27c510d53f65ab73b98057452604d3e5070921987398ce160
-
Filesize
6KB
MD51eb987e463580d28990aa01a075774f5
SHA1dbb54f0752d3a6a7e76690b6d53a1ed3efc937ef
SHA256dee3493bf6a207f970f31d07958f24f199ba66aa533b2e6b0aabfad7c473c8bb
SHA512caa265651073eaf643ed780fef87ebbaba2732deb92461e834e7475ae15e5f03743d281842a7f7807cfe7c814784d578f5979e7ba88ac4104df8ed2cc90fae59
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD534e72c3c80c7be085abd1c561c3e63a8
SHA1bbac216474db61acfc644e651caa965106c5a116
SHA256a04dee027d364df07f3b367509e311f73e15d80f3fb1bcc8239963cd5ff713e1
SHA5126ca3aaaf8be9c746b01fc8bbd0aa6ca271a9a179f6076a80a42daf4235df389f107c65d4d6a99ea3cab302410aa21b2193a6fe286426871ef04f97e0dac1e0d7