Overview
overview
7Static
static
3LEGEND注�...pk.dll
windows7-x64
7LEGEND注�...pk.dll
windows10-2004-x64
7cz.htm
windows7-x64
3cz.htm
windows10-2004-x64
3js.htm
windows7-x64
3js.htm
windows10-2004-x64
3kf.htm
windows7-x64
3kf.htm
windows10-2004-x64
3xz.htm
windows7-x64
3xz.htm
windows10-2004-x64
3yuantu.htm
windows7-x64
3yuantu.htm
windows10-2004-x64
3zb.htm
windows7-x64
3zb.htm
windows10-2004-x64
3易模板.url
windows7-x64
1易模板.url
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
LEGEND注册机/1.76 连击版引擎注册/lpk.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LEGEND注册机/1.76 连击版引擎注册/lpk.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
cz.htm
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
cz.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
js.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
js.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
kf.htm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
kf.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
xz.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
xz.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
yuantu.htm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
yuantu.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
zb.htm
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
zb.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
易模板.url
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
易模板.url
Resource
win10v2004-20240802-en
General
-
Target
zb.htm
-
Size
13KB
-
MD5
8ab418e56b02d3f15404728639a8d6a1
-
SHA1
357aa754702099b56364d8d5eddb32c01c192149
-
SHA256
6d0c5c9e335330031b048df4019b1203740f78925ad880ef065e74bb2a09c537
-
SHA512
658fa2d0e2369cb224834d70633e2247d10ffdcba2bbf029cd6bb758237a62e41152a4e6840950e3453d5e1b831b4ee140b75c8ce167b31d04f24570e83bacac
-
SSDEEP
384:SCvfHpRgccuyy1kcgccuyy1kcgccuyy1kcgccuyy1kcgccuyy1kcgccuyy1kcgce:SiBRNvNvNvNvNvNvNvNvN2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3004 msedge.exe 3004 msedge.exe 640 identity_helper.exe 640 identity_helper.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3588 3004 msedge.exe 82 PID 3004 wrote to memory of 3588 3004 msedge.exe 82 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 4652 3004 msedge.exe 83 PID 3004 wrote to memory of 3420 3004 msedge.exe 84 PID 3004 wrote to memory of 3420 3004 msedge.exe 84 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85 PID 3004 wrote to memory of 4196 3004 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\zb.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4b2446f8,0x7ffa4b244708,0x7ffa4b2447182⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,18178688825157831820,1434517728111589367,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5e9f2f73ff1b28f3a5a2d21050e3c868e
SHA1ec8084b59802160246fac5e6d1412316cae50ab6
SHA256a8d0e3418b7be7e2ad442349557933013128db848e14f0722f888a9ae02ffc39
SHA5123707c22d9185f1043752411c5430d5e8dadfc29d7df61389076ab02aa29f58a29a8a06d403d9f1368af5933b1165de6daa40e369d0f846d8a398f8d55c20c870
-
Filesize
6KB
MD5434b9a87f744629126a35c3baeb3613c
SHA17bac178ad2522149f61769979553d2fb4cf94f1c
SHA256edcd251f1afda43f291a36c4c94ba82badf69bb3cc4c2132aca0bdb0882b0071
SHA512bd887e17c4a2edea09d1f2769c335ce4f4204b25b424a4339eb4b1913104aefd73876c3b30a921df8e08074d76813eb7c54bb66592768455afa84bc3b07f0883
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56cf03e22490409cb562fdc47a6847aa4
SHA1244e3cc0da4bb0f50da8c61ed8515d7b041a68a0
SHA256936935d108396aaeeeefb7ba97f1767092ae5cfc474082a4b5d46ef69aeaf04c
SHA512ba71555b3ebc8849c9ba6f6e058335ee614f1f8af02a0b4a3f4affe898707ba3fb7ff1b0710b5edd9f8c83aed61e85b93231725b90318dd72aec18afc843729b