Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-09-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
MfFgzT.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
MfFgzT.html
Resource
win11-20240802-en
General
-
Target
MfFgzT.html
-
Size
512B
-
MD5
57292c5b5933fa957d77b4443d5e2947
-
SHA1
c51ae5797a024b2d4c803dfc815841aadff2929e
-
SHA256
d7737947b934ec2b5f21190c7d7e72871d715b9528988bccb7ef6211bec4c843
-
SHA512
411dfd63f1cb8591af5f4abc123a1ea48301222477ca22dd71e8a9d90e01e22b1ba2ad17c473cff27b5424977b58fa4ab60a792e9bd3b2bd42ea7966cdccacf1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4084 msedge.exe 4084 msedge.exe 4400 msedge.exe 4400 msedge.exe 1672 identity_helper.exe 1672 identity_helper.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4324 4084 msedge.exe 81 PID 4084 wrote to memory of 4324 4084 msedge.exe 81 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 5536 4084 msedge.exe 82 PID 4084 wrote to memory of 4160 4084 msedge.exe 83 PID 4084 wrote to memory of 4160 4084 msedge.exe 83 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84 PID 4084 wrote to memory of 2404 4084 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\MfFgzT.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff381f3cb8,0x7fff381f3cc8,0x7fff381f3cd82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:5536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1404 /prefetch:82⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,2604355260970468900,11396170137384277000,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59828ffacf3deee7f4c1300366ec22fab
SHA19aff54b57502b0fc2be1b0b4b3380256fb785602
SHA256a3d21f0fb6563a5c9d0f7a6e9c125ec3faaa86ff43f37cb85a8778abc87950f7
SHA5122e73ea4d2fcd7c8d52487816110f5f4a808ed636ae87dd119702d1cd1ae315cbb25c8094a9dddf18f07472b4deaed3e7e26c9b499334b26bdb70d4fa7f84168d
-
Filesize
152B
MD56fdbe80e9fe20761b59e8f32398f4b14
SHA1049b1f0c6fc4e93a4ba6b3c992f1d6cecf3ada1f
SHA256b7f0d9ece2307bdc4f05a2d814c947451b007067ff8af977f77f06c3d5706942
SHA512cf25c7fd0d6eccc46e7b58949c16d17ebeefb7edd6c76aa62f7ab5da52d1c6fc88bde620be40396d336789bd0d62b2162209a947d7ab69389e8c03682e880234
-
Filesize
5KB
MD5a9988215fd53deae6aaada4a26ef9ebc
SHA1d49881bd5ff32d8c9709962fa88d723fd99c7d09
SHA25626b89880d7c708bd01cd1abeba6c512952812de9854b404c2b9d1dbbfc5570b9
SHA512bc7a7011b2093d716c23e0a0d8cccde56ba661511a36b6dc307965b18c0a20c5b66edd7c5e6c1161ed3bb386a0cfe5f74804144a7dfd47221af305eed2b0a0d5
-
Filesize
5KB
MD59c6a806a5cb379f5ccf480215a9755b5
SHA10d1edfe6614c3c2a842d53e510e966cc1bc71c50
SHA2567d579914de187e47e7f071250aa34910df62e969770d38c5c8b0b1dd3de1cd4a
SHA512c1913f83d164f06cc686e5a25c33eb331679e320b3853405e98ddcb3a9166b3026647eac05a4ff0ddef49afbf1f2848f9f7501ce3dc98b922c69ee2fb6731ad3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5a4483d9e6aef68e2df1deba27529505a
SHA17621c0b11f5be3385d1a0cbd03a64091fdd4de39
SHA2563ce1893da832c9722244e080ad8b4a2a07d34d1c3bac6625aa5e92c82dfde8b0
SHA512fa292cc5a2554536bb86532a08e53f25b3a3c6cf11e2ebd246dfef81b6f15ac2cb4dcd0cedfce858d00fc1b1cdd468c71f831a03954416fd44d1d2275ade5b8b
-
Filesize
10KB
MD54285bda34daa86793761c5e1f90e013d
SHA1df8c027ea4a80fb983c108c581e788b9f6c8c8b0
SHA256eab00ed3974df423889da4725a22d6d62e13f93254ff08e052b0d14a810576f9
SHA51273946a52451e365628aa2dfdc84104e9391a9b8e11eb224a627cc80da484a870883f522bd102c9fd461b2bfd542bdfcc9b4efb2de4f4f06ab453b0a54312b460