Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
email-html-1.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
email-html-1.html
Resource
win10v2004-20241007-en
General
-
Target
email-html-1.html
-
Size
34KB
-
MD5
6769ca4f5871486049afda6863aa1c13
-
SHA1
c714f064b61d12e97b199ba2a28fc81fa5967add
-
SHA256
0fcf8f1da45d96f1750fc86b10340bd81090abb10d9456a75456dd76c18314b1
-
SHA512
eb68eac65de9323f2c0b62f27fe8c23b8b15bfeb9beebf3e8cfe63d6073a65944ec94cc4efd891354531739f0895f5ad3ff73800f98a935dca1f5b4f85a5b737
-
SSDEEP
384:rxl+oHzOlKesHr+xwoutCDsqWgQIkgmdyppiRyWeWUdMQq:Nl+PmQwoutCDsVgKgwOAHeW4M
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3816 msedge.exe 3816 msedge.exe 4576 msedge.exe 4576 msedge.exe 2800 identity_helper.exe 2800 identity_helper.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 4336 4576 msedge.exe 83 PID 4576 wrote to memory of 4336 4576 msedge.exe 83 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 2820 4576 msedge.exe 84 PID 4576 wrote to memory of 3816 4576 msedge.exe 85 PID 4576 wrote to memory of 3816 4576 msedge.exe 85 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86 PID 4576 wrote to memory of 552 4576 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd56ce46f8,0x7ffd56ce4708,0x7ffd56ce47182⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4164 /prefetch:82⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17279284169624900477,6447780104997933909,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
334B
MD533d933650f435bd3b2e5ce1e67655036
SHA1391be57b48211cf2bb0210072f151454bcc436df
SHA256993614c505a6ccf58195f9deeb861c4dbfd298b9dfc7dfd7ddbff3ff572bb2c4
SHA512c4fec6e13a45659b9de6ed5db7e5bc9fa53e0cc29d22b5891580ad53d11ced824124f1f60d16972dbbf22093a596dc1cb5a092ae761ca6d27f567eb4b65ae052
-
Filesize
6KB
MD533dea4bfcbb0002b585d0c1ffcb894ad
SHA1dec83ba050fc00ca9e55845116849cf1679c74eb
SHA25648e583592b72d9d313a60d0eb452088eb94c89d8b16f8283f1189fb2bc1ab837
SHA51207f44c617100d816aff0a76fcdfed1f123d4051759f7018df501d3502478712d969e4fce7ef9c59b303d81bc985ce525d5fdec652d583c5346850cdf483d5012
-
Filesize
6KB
MD55772372d4bf11d06cc3511f38577393e
SHA1b83e6894710bbf5b518a1a4ded268f8b7ef043b4
SHA256b71480ff413c0a6e2e1089b6563558516d9f18941e228b504c7fb90f3895e98a
SHA512b5fe7192fe91433f614e37cedef68f053b07e3f26f0c81bd70f945a7961cea2ed38b43c560959e0d3316eb7647a3bd7a962922932071355482fd1a52ad568b58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57b4db48e4146b22bd296e29384a6f8a7
SHA1f59e37dd6ca249b6d8f8f2fd365c3229d4ec2b38
SHA256f1424c439633e61cfafb9d68afe5a0dea449d8b957c80b09fe3be16083613d18
SHA512d24561bd76c343871ccdd2a047b37d8f3011a303f1132a371877b4c645801b94a9196dda669ea6579dd60f67329db1712d38312ad47161b0b8601acd36d84c79