Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:56
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
77543d3f81a76af9fed66b2a35136f23
-
SHA1
9d8822eac3c1936f16c192c1e97514be58973b4c
-
SHA256
6440bb58d8708eb1a600d6367eb779f842228d89ad3ef2db590c1adc7cbe1948
-
SHA512
711860eacbd97fca3f48314520a9d0c0076c8de331d9c5e3486b027e245217b9184709301b6309f9cdae6bed019493e4ff49360db9e917acfde1694d0fa655ca
-
SSDEEP
3072:S7UMutFLpjCyfkMY+BES09JXAnyrZalI+YQ:S7ErHsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 4968 msedge.exe 4968 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 5096 4968 msedge.exe 82 PID 4968 wrote to memory of 5096 4968 msedge.exe 82 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 2944 4968 msedge.exe 83 PID 4968 wrote to memory of 1888 4968 msedge.exe 84 PID 4968 wrote to memory of 1888 4968 msedge.exe 84 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85 PID 4968 wrote to memory of 4584 4968 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2a9f46f8,0x7ffd2a9f4708,0x7ffd2a9f47182⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9278893409371754607,16323591750129373994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9278893409371754607,16323591750129373994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9278893409371754607,16323591750129373994,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9278893409371754607,16323591750129373994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9278893409371754607,16323591750129373994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9278893409371754607,16323591750129373994,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
6KB
MD58e8b0c23bccef0e8d8c441004039a579
SHA18d3cf46eabdef10ffe24c310873a243a0a0bdb3f
SHA2560d3334dac9fe4a9f7c3796ca3f76cddf057fea5359c5a826022ef1c07aedd400
SHA5129f7f101321edfcef77be514a65d43296d61858eb39a9d42dcf00741dd211f04f38fdb5bd603e907dfa2c4fd3b6077c6ff1705b8a93748ac0a806d22ee81483d1
-
Filesize
5KB
MD5f6a16d9369dfe71a2e05bee52a739f7b
SHA1a4af85ae12d4dff437677edf58d3c2468c5503eb
SHA256cfb96de5e74ef4d1cf1e4c898d075c260afc9e8ce981c440d5959be328cd2c15
SHA5126d25e611fcd44141c9a0f32a49aadbc43b3617a3e3fd68a9828b2f5609482d85854bb743f9b21c1c74c9dd1a891dc668b4b0adab5c0aff4f543dc2ebee459f83
-
Filesize
10KB
MD590d6f254717fa3463a2539f9ff2ca2f2
SHA1cd7945534e6dfe982590221ee227bebf653e3afa
SHA25637a1736455a911f181258a43e3c5523d8327c2ba5539590feec30d78e2b072bf
SHA512f01d7e8a6d5f874ccd0c78f24a90f19ea25d3feeedc3966c945cca016e8194eea849b8c7c6f3709e95e0972ef6c3b8e72f9e7cccfd9cf771677fae10250a11b8