Analysis
-
max time kernel
32s -
max time network
23s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-10-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win11-20240802-en
General
-
Target
sample.html
-
Size
508KB
-
MD5
797fbcf7bb58e8783e0072923afec6e7
-
SHA1
b7a8a21ddb4a2d7a08e0594da2788c4ff49c0160
-
SHA256
d2f16c673e6a924fcdc98d459e392f7d60f3153e59dec258bb2fa2e180f484cb
-
SHA512
ddc4050f449299fe87fec76de32780408daa716a34298dc41af667bf657a5e5986ed00eb19c8b35c7bca32488efe77020b291a421b888a5ee1c6d949eb2d897a
-
SSDEEP
6144:lMX9ed9er9eU9eF9ek9eM9em9eJ9eV9eCPE2:lW909M9f9o9z9X9T9I9y9fPE2
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3716 POWERPNT.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3716 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 740 msedge.exe 740 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3716 POWERPNT.EXE 3716 POWERPNT.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 4836 740 msedge.exe 77 PID 740 wrote to memory of 4836 740 msedge.exe 77 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 1408 740 msedge.exe 78 PID 740 wrote to memory of 2852 740 msedge.exe 79 PID 740 wrote to memory of 2852 740 msedge.exe 79 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80 PID 740 wrote to memory of 2472 740 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa7c973cb8,0x7ffa7c973cc8,0x7ffa7c973cd82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,14617709540954123876,8017058961213692325,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,14617709540954123876,8017058961213692325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,14617709540954123876,8017058961213692325,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14617709540954123876,8017058961213692325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,14617709540954123876,8017058961213692325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:3040
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\Desktop\ShowPing.ppsx" /ou ""1⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e2612636cf368bc811fdc8db09e037d
SHA1d69e34379f97e35083f4c4ea1249e6f1a5f51d56
SHA2562eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9
SHA512b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d
-
Filesize
152B
MD5e8115549491cca16e7bfdfec9db7f89a
SHA1d1eb5c8263cbe146cd88953bb9886c3aeb262742
SHA256dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e
SHA512851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54
-
Filesize
584B
MD5d284c26334e1414c6acef72ee4601645
SHA1d6c8d9f7d48ed7ee1ffb495a17c717fee74c4563
SHA256c3c221ac637e20d5c3afe7d1f5716b9d6ad86238bf838e282aa40ba2664cc318
SHA512bb2328cca9690792870f605726cc370c9c7c8f13f5536ffe845648aefae19ace68c1e8a410f67d6e9b71a428e1de1faac73eb610745ec8e049439e55600b986f
-
Filesize
5KB
MD528256049e5952cc9a01068b1f7c93a9c
SHA1a7252fbe02a0a7fc25b989866168d730d5d9ddb0
SHA25626ea750deb7622e4d1c80ba0b036132826799e2689a7eb07796cea5e8a01378d
SHA512698348d365170a1299d3c6e9301ce664a03eeb31a34365f7d9a02a09d0d04d4ee9f393b5c145384098e6fb79915b867aa85a07d36adb330af9a3c8672d4c5708
-
Filesize
5KB
MD54afbc670dc7060467b2e3e4eef74335a
SHA1fbee561ef1e018795fa7511657d1b375dae09b99
SHA2566d6e4b7d00075bc20e0ff0e41cb7f33ae5e2f477c7d6cf5687bb2ca45bca02c9
SHA51270cb9fac7f27b2760c1c9a18f6f0140ce917833609ec92b9a2bc8c60342ea02b494b395bcb29cc9ddfde815d17edf0af5228eda83c9664aa0af839889ce1022f
-
Filesize
10KB
MD5a5da5760fe6472a8fd02c74be01af307
SHA18fad601ff00c599892f7593b698f97b9ccb0e2b9
SHA256fccaa59359ed24d5bb01477d20c431610050d8234e5fb1d61197c70e07dd7fe6
SHA512cba24cea91d2be109e9fc9df5bc1998fe42f4036882dc6e53279fcfa5565464d8657ca2943ca50e0f32f13838bf8ef355e2bcb97e0a026066c757e236f295e78