Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240802-en
General
-
Target
sample.html
-
Size
220KB
-
MD5
96b57f726102a6edb460e0dc32a9f9bf
-
SHA1
71280dbf4e0ecaf1223f269c4f60c7241ff65db2
-
SHA256
6b50c0a9c8b9b423f250efad4d8721f5c0b63ffa34a032808e4ef5d7b9be68cf
-
SHA512
9b7398a23c7105164afcb12610160b8e014ff955b6266e51f3889458c215dcd640af812277a693450bc48a50eb0f6639fbcbeb46837e204eb85924465a23d2f9
-
SSDEEP
3072:Sa0tFDV4ea/1U2yfkMY+BES09JXAnyrZalI+YQ:SaOWVYsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 4360 msedge.exe 4360 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe 4360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 2100 4360 msedge.exe 82 PID 4360 wrote to memory of 2100 4360 msedge.exe 82 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2184 4360 msedge.exe 83 PID 4360 wrote to memory of 2648 4360 msedge.exe 84 PID 4360 wrote to memory of 2648 4360 msedge.exe 84 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85 PID 4360 wrote to memory of 1588 4360 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb757a46f8,0x7ffb757a4708,0x7ffb757a47182⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,17163282415754485286,407764866765741622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,17163282415754485286,407764866765741622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,17163282415754485286,407764866765741622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,17163282415754485286,407764866765741622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,17163282415754485286,407764866765741622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,17163282415754485286,407764866765741622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5448dd0bc2baf7a4880a765fceb3ac3f0
SHA15e9f553e1a591a9db7bfe2a65190ed2ae05fcd25
SHA256721c37054f7343dce1c73457e466a5ae148a8798d38591e7ad838ce8be16b09e
SHA512feffde4313077e703c7f7447c9128a2151ba1b9149a6b9f9b31dbe5a3045264270f348332b40c9a140ee40e0feafb878eceee54a7897a455941a64272aabd07c
-
Filesize
6KB
MD5ef727fb9a3ebcbd0dfdd5473cc13efc3
SHA15eefbe14a2d2da1d0a5d1c55c64c968bb5695331
SHA256a1c838f6fd16e2002893be9c98714ad66c2208b4b60cc0b26534c57316738f6c
SHA512021d69e0d27d53f4bc247362f59957788760abcaf510e09aa804b21a18f064ca31fc44e762643b8eb503b2fa9198f8edc1236d81bc0acf4b513a915da95fec4a
-
Filesize
10KB
MD51b2bbfc892f2c4a966513302a2db9895
SHA17dde9f1aecf1988e820d61acd3017fd3d5349bbf
SHA2565bd6cc63535aa18d9d55b8826ff2f09ebf2324f98051fde0e2e73701bf235c8f
SHA5127490ea9a697208298cd40f9fe668effb828754902f89c1b2f24023d4d189e7f13426d93a32394cfaf9d45d400910aa7784858800842b72aa2cfa4cf45edb8a41